Categories
stalkerware

Video: Understanding Stalkerware

We spoke to Chloé Messdaghi from Point3 Security, about what it is, who uses it, and what you should do if you’re being spied on via your phone

Categories
stalkerware

How does stalkerware get on your phone?

Here are the four main ways a stalker can put stalkerware on your phone or monitor what you’re doing.

Categories
cybersecurity stalkerware

Using Trustd to stay protected from stalkerware

Trustd is purpose-built to protect you from apps that spy on you, known as stalkerware.

Categories
stalkerware

How to find and remove stalkerware on Android

Do you think someone might be spying on your Android phone? How to detect and remove stalkerware from your device.

Categories
stalkerware

How to find and remove stalkerware on an iPhone

Do you think someone might be spying on your iPhone? How to detect and remove stalkerware from your device.

Categories
bossware spyware stalkerware

What are spyware, stalkerware and bossware?

Spyware, stalkerware and bossware can read your messages, capture your screen, track your location, listen to your microphone and watch through your camera. So what’s the difference?

Categories
cybersecurity

How websites can use your camera when your phone is locked

A bug in Firefox has exposed a little known fact about what apps can do behind your back.

Categories
cybersecurity

Android Incident Response Lab 3

Introduction During this lab we tie together techniques used in Lab 1 and Lab 2 to identify a malicious app sitting on our device along with the information it could have obtained access to. Following this, we move onto stage 3 of incident response, the containment phase to remove this malicious app from our device. […]

Categories
Uncategorized

Traced CTF

Introduction Rather than releasing our usual weekly incident response lab, this week we’re releasing a practical learning experience of an open source capture the flag competition.   You may be asking yourself how this ties in with Android incident response training, you’ll have to use some advanced techniques associated with the identification phase of Android incident […]

Categories
cybersecurity

Protected: traced CTF Submission

There is no excerpt because this is a protected post.