How to Protect Your iPhone or Android Device From Spyware

https://www.profitableratecpm.com/f4ffsdxe?key=39b1ebce72f3758345b2155c98e6709c

The infection typically begins with malicious links and fake apps, but it also occurs through “more subtle methods,” says Richard LaTulip, field CISO at security firm Recorded Future, who collaborated with Google’s threat intelligence team on the Predator spyware findings.

LaTulip cites the example of recent research into malicious browser extensions affecting millions of users, which shows “how seemingly innocuous tools can become surveillance devices.”

These techniques, often developed by state adversaries linked to governments, indicate a trend toward “more covert, more persistent, and device-level compromises,” he says.

A bigger problem

Over the past few years, spyware has become a growing problem. Governments and companies that create this malware claim that the surveillance tools are used only to target criminals and terrorists, or for national security purposes.

“But the truth is that human rights activists, journalists and many others around the world have been illegally targeted by spyware,” Rebecca White, Amnesty International’s researcher on targeted surveillance, told WIRED. “In this way, spyware can be used as a tool of repression, to silence people who speak truth to power. »

Thai activist Niraphorn Onnkhaow is a perfect example. Between 2020 and 2021, at the height of pro-democracy protests in Thailand, Onnkhaow was targeted 14 times by the Pegasus spyware. Shortly after, she decided to end her role in the protest movement, fearing that her private data would be used against her.

“Data can be weaponized and lead to more abuse, online and offline, especially for people who already face discrimination based on their identity, for example on the basis of gender or race,” says White.

Beyond activists, mobile spyware appears to target a broader subset of people, often in professional settings. The malware affects “a wide range of layers of society,” from government officials to financial IT professionals, says iVerify’s Cole. “Increasingly, it is being used beyond intelligence gathering, to steal credentials to gain access to the enterprise. »

Signs that you have been affected

Spyware is difficult to detect, especially sophisticated strains such as Pegasus and Predator, which are usually only discovered through forensic analysis. But you may notice subtle signs, such as your device overheating or slowing down, or your camera or mic activating when they’re not supposed to be in use.

Although advanced spyware may leave little or no visible trace, sudden drops in performance or changes in connectivity can serve as warning signs, says LaTulip.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also
Close
Back to top button