{"id":615,"date":"2019-08-27T04:55:14","date_gmt":"2019-08-27T04:55:14","guid":{"rendered":"http:\/\/www.techtodayinfo.com\/?p=615"},"modified":"2019-08-27T04:55:15","modified_gmt":"2019-08-27T04:55:15","slug":"are-you-spying-on-your-mobile-so-you-can-find-out","status":"publish","type":"post","link":"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/","title":{"rendered":"Are you spying on your mobile? So you can find out"},"content":{"rendered":"\n<p>The temptation is there: a family member forgets his\u00a0cell phone\u00a0on the table and the curiosity arises to snoop on the\u00a0WhatsApp\u00a0, the calls received or what web pages this person has visited, especially if doubts arise about fidelity as a couple.\u00a0This temptation is not new but beyond getting the victim&#8217;s cell phone and browsing its content, there are now tools that do that dirty work without the knowledge (or consent) of it.\u00a0This phenomenon has a name and has been baptized as\u00a0<em>stalkerware<\/em>\u00a0(something like &#8220;stalker virus&#8221;), and the bad news is that anyone can be spied on without being aware of it.\u00a0How to detect if the mobile is affected by this software?<\/p>\n\n\n\n<p>&#8220;Unlike parental control applications, these are not visible on the victim&#8217;s mobile&#8221;<\/p>\n\n\n\n<p>Before analyzing the keys to detect this spy in the mobile, it is convenient to know how exactly the\u00a0<em>stalkerware<\/em>operates\u00a0.\u00a0These applications have an operation very similar to that of\u00a0<em>malware<\/em>\u00a0or viruses: they are installed in the victim&#8217;s terminal and once there they begin to register all kinds of activity that is subsequently sent to a server accessed by the spy.\u00a0However, this technique is not exactly the same: \u201cUnlike\u00a0<em>malware<\/em>, which is installed massively, this software is installed by someone who has access to the mobile phone, \u201dexplains Fernando El Suarez, vice president of the General Council of Colleges of Computer Engineering, who also qualifies another important peculiarity of this type of apps: &#8220;Unlike parental control applications, these are not visible on the victim&#8217;s mobile.&#8221;\u00a0But &#8230; how to know if a mobile is being spied using\u00a0<em>stalkerware<\/em>\u00a0?<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Appearance of unexpected pop-ups in the browser<\/h3>\n\n\n\n<p>The popular radio show in the United States, Kim Komando,\u00a0warns\u00a0that one way to discover a mobile victim of this espionage is through the sudden appearance of\u00a0<em>pop-up<\/em>\u00a0windows\u00a0in the browser.\u00a0These are unusual behaviors that should not be minimized by the victim.\u00a0Similarly, a sudden increase in\u00a0<em>spam<\/em>\u00a0in email and receiving text messages from strangers too often should be grounds for triggering alarms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Did the phone temporarily disappear?<\/h3>\n\n\n\n<p>If the strange behavior of a device has been preceded by a temporary loss of it (for example, it is left in one room and after searching for it, it appears after a few hours in another), this terminal is likely to have been temporarily stolen to install these programs .&nbsp;Experts remind us that it takes a few minutes with the mobile in hand to install these apps.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The battery suddenly lasts much less<\/h3>\n\n\n\n<p>A mobile with&nbsp;<em>stalkerware<\/em>&nbsp;works much more than a clean one, and this activity has its logical impact on battery life.&nbsp;If a sudden decrease in its performance is detected, accompanied by any of the other situations mentioned above, it is necessary to suspect and take the necessary measures.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The mobile is constantly overheating<\/h3>\n\n\n\n<p>As a continuation of the battery consumption, a mobile affected by this evil has to perform many more tasks than another&nbsp;<em>clean<\/em>&nbsp;&nbsp;and this also results in an increase in the temperature&nbsp;of the battery&nbsp;.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Install apps outside app stores<\/h3>\n\n\n\n<p>It is not a symptom in itself, but if any of these atypical behaviors are detected after having installed an application outside the official stores (App Store or Google Play), the possibility that the terminal has been infected is triggered.&nbsp;Both Apple and Google take the security of their platforms very seriously, and it is therefore highly recommended to install apps from their official stores.&nbsp;The good news for iPhone owners is that this device is hardly vulnerable to this attack since Apple forces to install all its apps through the store;&nbsp;Android is more likely to be attacked because it is feasible to install applications out of Google&#8217;s control.<\/p>\n\n\n\n<p>What to do if there are suspicions?\u00a0The most advisable thing is to carry out a restoration of the equipment to the factory values, although additionally it is recommended to install software that can detect this phenomenon.\u00a0&#8220;In 2018, we identified more than 26,000\u00a0<em>stalkerware<\/em>\u00a0applications,\u00a0&#8221; explains Daniel Creus of Kaspersky Security, to give\u00a0a real dimension\u00a0of the problem.\u00a0This company has recently modified its mobile security applications to address this phenomenon.<br><\/p>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The temptation is there: a family member forgets his\u00a0cell phone\u00a0on the table and the curiosity arises to snoop on the\u00a0WhatsApp\u00a0,<\/p>\n","protected":false},"author":1,"featured_media":616,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[269],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Are you spying on your mobile? So you can find out - Tech Today Info<\/title>\n<meta name=\"description\" content=\"Are you spying on your mobile? So you can find out Experts alert to the growth of &#039;stalkerware&#039;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are you spying on your mobile? So you can find out - Tech Today Info\" \/>\n<meta property=\"og:description\" content=\"Are you spying on your mobile? So you can find out Experts alert to the growth of &#039;stalkerware&#039;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Today Info\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/techtodayinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-27T04:55:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-27T04:55:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techtodayinfo.com\/wp-content\/uploads\/2019\/08\/telephone-586268_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechTodayInfo1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/\",\"url\":\"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/\",\"name\":\"Are you spying on your mobile? So you can find out - Tech Today Info\",\"isPartOf\":{\"@id\":\"https:\/\/www.techtodayinfo.com\/#website\"},\"datePublished\":\"2019-08-27T04:55:14+00:00\",\"dateModified\":\"2019-08-27T04:55:15+00:00\",\"author\":{\"@id\":\"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/c7640b7cf1ce41c50026ca15a82049c1\"},\"description\":\"Are you spying on your mobile? So you can find out Experts alert to the growth of 'stalkerware'\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techtodayinfo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are you spying on your mobile? So you can find out\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techtodayinfo.com\/#website\",\"url\":\"https:\/\/www.techtodayinfo.com\/\",\"name\":\"Tech Today Info\",\"description\":\"Technology Write For Us\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techtodayinfo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/c7640b7cf1ce41c50026ca15a82049c1\",\"name\":\"Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/956b09a06803bc335d817b044dec5ca0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/956b09a06803bc335d817b044dec5ca0?s=96&d=mm&r=g\",\"caption\":\"Rose\"},\"description\":\"Rose is a technology enthusiast and a writer. She had the interest to write articles related to technology, software, Mobiles, Gadgets and many more.\",\"sameAs\":[\"https:\/\/www.facebook.com\/techtodayinfo\/\",\"https:\/\/in.pinterest.com\/ttodayinfo\/\",\"https:\/\/twitter.com\/TechTodayInfo1\"],\"url\":\"https:\/\/www.techtodayinfo.com\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are you spying on your mobile? So you can find out - Tech Today Info","description":"Are you spying on your mobile? So you can find out Experts alert to the growth of 'stalkerware'","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/","og_locale":"en_US","og_type":"article","og_title":"Are you spying on your mobile? So you can find out - Tech Today Info","og_description":"Are you spying on your mobile? So you can find out Experts alert to the growth of 'stalkerware'","og_url":"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/","og_site_name":"Tech Today Info","article_author":"https:\/\/www.facebook.com\/techtodayinfo\/","article_published_time":"2019-08-27T04:55:14+00:00","article_modified_time":"2019-08-27T04:55:15+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.techtodayinfo.com\/wp-content\/uploads\/2019\/08\/telephone-586268_1920.jpg","type":"image\/jpeg"}],"author":"Rose","twitter_card":"summary_large_image","twitter_creator":"@TechTodayInfo1","twitter_misc":{"Written by":"Rose","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/","url":"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/","name":"Are you spying on your mobile? So you can find out - Tech Today Info","isPartOf":{"@id":"https:\/\/www.techtodayinfo.com\/#website"},"datePublished":"2019-08-27T04:55:14+00:00","dateModified":"2019-08-27T04:55:15+00:00","author":{"@id":"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/c7640b7cf1ce41c50026ca15a82049c1"},"description":"Are you spying on your mobile? So you can find out Experts alert to the growth of 'stalkerware'","breadcrumb":{"@id":"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.techtodayinfo.com\/are-you-spying-on-your-mobile-so-you-can-find-out\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techtodayinfo.com\/"},{"@type":"ListItem","position":2,"name":"Are you spying on your mobile? So you can find out"}]},{"@type":"WebSite","@id":"https:\/\/www.techtodayinfo.com\/#website","url":"https:\/\/www.techtodayinfo.com\/","name":"Tech Today Info","description":"Technology Write For Us","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techtodayinfo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/c7640b7cf1ce41c50026ca15a82049c1","name":"Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techtodayinfo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/956b09a06803bc335d817b044dec5ca0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/956b09a06803bc335d817b044dec5ca0?s=96&d=mm&r=g","caption":"Rose"},"description":"Rose is a technology enthusiast and a writer. She had the interest to write articles related to technology, software, Mobiles, Gadgets and many more.","sameAs":["https:\/\/www.facebook.com\/techtodayinfo\/","https:\/\/in.pinterest.com\/ttodayinfo\/","https:\/\/twitter.com\/TechTodayInfo1"],"url":"https:\/\/www.techtodayinfo.com\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/posts\/615"}],"collection":[{"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/comments?post=615"}],"version-history":[{"count":1,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/posts\/615\/revisions"}],"predecessor-version":[{"id":617,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/posts\/615\/revisions\/617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/media\/616"}],"wp:attachment":[{"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/media?parent=615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/categories?post=615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techtodayinfo.com\/wp-json\/wp\/v2\/tags?post=615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}