Adam Adler about Cellphone Anti Tapping: Beware of unknown applications. How to detect Spyware?
Know where your apps come from.
Don't just download any app on your phone. While iPhones only run apps from Apple's App Store, which vets all apps sold from the platform, standards are not quite as high on Android.
The Google Play Store has made progress in ensuring its apps aren't running malware, but the Android platform allows installation from various, less-regulated environments.
The best way to avoid malware on Android is to stick with the Google Play Store unless you are sure you can trust an independent app from somewhere else.
From email to banking, our smartphones are the main hub of our online lives. No wonder that smartphones rival computers as common targets for online hackers. And despite the efforts of Google and Apple, mobile malware continues to land in official app stores – and these malicious apps are getting sneakier. According to the McAfee 2020 Mobile Threat Report, over half of mobile malware apps “hide” on a device, without a homescreen icon, hijacking the device to serve unwanted ads, post bogus reviews, or steal information that can be sold or used to hold victims to ransom.
And while iPhones can be hacked, more malware targets Android devices. In its 2020 State of Malware Report, MalwareBytes reported a rise in aggressive adware and preinstalled malware on Android devices designed to steal data – or simply victims’ attention.
Malware can also include spyware that monitors a device’s content, programs that harness a device’s internet bandwidth for use in a botnet to send spam, or phishing screens that steal a user’s logins when entered into a compromised, legitimate app.
It is often downloaded from non-official sources, including phishing links sent via email or message, as well as malicious websites. (While security experts recommend always downloading from official app stores – like the Apple App Store or Google Play – some countries are unable to access certain apps from these sources, for example, secure messaging apps that would allow people to communicate secretly.)
Then there are the commercial spy apps that require physical access to download to a phone – often done by those well-known to the victim, such as a partner or parent – and which can monitor everything that occurs on the device.
While a phone’s battery life inevitably decreases over time, a smartphone that has been compromised by malware may start to display a significantly decreased lifespan. This is because the malware – or spy app – may be using up phone resources to scan the device and transmit the information back to a criminal server.
Do you find your phone frequently freezing, or certain applications crashing? This could be down to malware that is overloading the phone’s resources or clashing with other applications.
You may also experience continued running of applications despite efforts to close them, or even have the phone itself crash and/or restart repeatedly.
Another sign of a compromised phone is an unusually high data bill at the end of the month, which can come from malware or spy apps running in the background, sending information back to its server.
If you’re seeing lists of calls or texts to numbers you don’t know, be wary – these could be premium-rate numbers that malware is forcing your phone to contact; the proceeds of which land in the cyber-criminals wallet. In this case, check your phone bill for any costs you don’t recognize.
While not all pop-ups mean your phone has been hacked, constant pop-up alerts could indicate that your phone has been infected with adware, a form of malware that forces devices to view certain pages that drive revenue through clicks. Even if a pop-up isn’t the result of a compromised phone, many may be phishing links that attempt to get users to type in sensitive info – or download more malware.
If a hacker has access to your phone, they also have access to its accounts – from social media to email to various lifestyle or productivity apps. This could reveal itself in activity on your accounts, such as resetting a password, sending emails, marking unread emails that you don’t remember reading, or signing up for new accounts whose verification emails land in your inbox.
In this case, you could be at risk for identity fraud, where criminals open new accounts or lines of credit in your name, using information taken from your breached accounts. It’s a good idea to change your passwords – without updating them on your phone – before running a security sweep on your phone itself.
Spyware or stalkerware refers to tools - apps, software programs, and devices - that let another person (such as an abuser) secretly monitor and record information about your phone activity. The term ‘stalkerware’ is a more recent term that draws attention to the invasive, intrusive, and dangerous misuse of these tools.
Phone spyware can be especially intrusive and dangerous for survivors, because it can monitor many things you do on your smartphone, including photos and videos you take, websites you visit, text messages you send and receive, your call history, and your location. Spyware installed on rooted (for Android) or jailbroken (for iPhone) devices can allow someone to turn on the webcam or microphone, take screenshots, see activity on third party apps (such as Snapchat or WhatsApp), and intercept, forward, or record phone calls. (A rooted or jailbroken phone removes the protections that the operating system and phone manufacturer put on the phone. It is possible to find out if your phone has been unlocked without your knowledge, which could offer a hint that spyware may have been installed.)
Almost all phone spyware requires that the person have physical access to the device to install. Once installed, it runs in stealth mode without any notification or identifying activity and is difficult to detect or remove. To access your phone activity, the person monitoring the device signs in to a website or accompanying app on a different device.
How Do I Find Out if Spyware is On My Devices?
Detecting spyware on your phone may be difficult. Some signs could include your battery draining rapidly, your device turning off and on, or spikes in your data usage. However, the most common sign that your activity is being monitored will be because of the abuser’s suspicious behavior. For example, they may know too much about your phone activities without another explanation. Trust your instincts and look for patterns. If the abusive person knows too much about your phone activity or knows things that you’ve only done on your phone, it’s possible that spyware may be on your device. A trained professional may have to check the device to know for sure.
Responding to Spyware
Safety first. Before acting to find or remove the spyware, it is important to consider safety and the possibility of collecting evidence. Many abusers use spyware as a way to monitor and control survivors. Some abusers may escalate their harassing and abusive behavior if they suspect that the survivor is cutting off their access. Before removing the spyware, think through your safety as you consider ways to protect yourself, and talk with an advocate about safety planning. If you need an advocate, please reach out to the National Domestic Violence Hotline.
Gathering evidence. Law enforcement or a computer forensics expert may be able to assist you if you want to preserve evidence needed for a criminal investigation or civil legal action. Their forensic tools may be the only way to determine for sure if spyware is on the device. Read more about Spyware Evidence.
Removing spyware. In most cases, a factory reset can remove the spyware. Be cautious of reinstalling apps or files from a backup or the App or Play Store as that might inadvertently re-download the spyware app. Manually add the apps or software that you want back onto the phone. You may also want to take the step of creating an entirely new iCloud or Google account for your device, and using that account to download apps. If you choose to do a reset, it’s critical that the phone not be connected to the backup to reinstall apps, contacts, photos, etc. When that happens, it’s incredibly likely that the spyware would reinstall too.
Use devices that aren’t being monitored. If you suspect that spyware is on your device, remember that most of your activity, including conversations, could be revealed to the abuser. If you can, use a safer computer or phone – one the person has not had physical or remote access to, such as a computer at a public library, community center, or a friend’s phone – when you look for help or information.
Update accounts. Since spyware would have given the person access to your login information, consider resetting your passwords on a different device and no longer accessing certain accounts from the phone you are worried about as a way to keep them out of the account. Also consider changing passwords to sensitive accounts such as online banks, social media accounts, etc. Read more about Password Safety.
Consider access. Be cautious if someone wants to update or fix something on your phone and trust your instincts if you don’t trust their intention. If someone did have access, consider if it coincided with increased monitoring or stalking. Beware of gifts of a new smartphone or tablet from an abuser to you or your children.
Lock your phone. Because most spyware requires physical access to the phone to install, place a passcode lock on your phone (and don’t share it) to minimize the risk of someone installing spyware. Many devices allow you to choose between a number, pattern, thumbprint, or other security features. Read more about Phone Security Tips.
Use anti-virus and anti-spyware protection. Download anti-virus and anti-spyware apps to your phone; these apps can help either prevent spyware from being installed or scan your phone for malware or spyware apps.
Use security features on your phone. Most Android phones have a setting that allows installation from unknown sources. Turning this off will minimize the chances of apps outside of the Google Play store from being installed on the phone. Another feature on Android phones is to turn on Google Play Protect, which will scan for apps with malware and viruses, which can protect the phone from most spyware. In addition, always install the latest operating system updates for your phone, which often include security patches.
Do not root (for Android phones) or jailbreak (for iPhones) your phone. Many of the more invasive spyware features don’t work unless the phone is rooted or jailbroken. On iPhones, most spyware cannot be installed unless it is jailbroken. A rooted or jailbroken phone will be more vulnerable to viruses and malware and make it easier for spyware to be installed.
There are many other methods someone can use to access information on your phone without installing spyware. If the abusive person has physical access to the phone, they may not need to install spyware, which is mostly for remote access.
Many of the apps and accounts on phones can be accessible from another device if the abusive person knows the username or email and password. Phones can also be monitored through the iCloud account for iPhones and Google account for Android phones. Increase the security of those accounts by ensuring that no one else knows the username and password.
Sometimes, an abusive person knows too much because of friends and family members. Look for patterns in what the person knows and where that information might have come from to help you to narrow down the possibilities. An advocate can help you figure out what may be happening and plan next steps.
Adam Adler is a serial entrepreneur with over 18 years of experience all at top-level management and ownership. Primarily investing his own capital and building brands from the ground up. At the early age of 4, Adam began his tennis career at the world-renown Rick Macci Tennis Academy in South Florida. Adam remained a highly ranked Junior Tennis player for his entire junior career. Once completing high school, Mr. Adler received a scholarship to play tennis at the University of South Carolina and graduated in 2007 Magna Cum Laude from USC, double majoring in Sports & Entertainment Management and Business. While at USC, Adam began his career by developing a patented algorithmic software as the base for his social networking company, Ultimate Social Networking Inc (USNI), and developing Ultimate College Model, seeing this to acquisition.
Adam’s love for completion never waned. Adam began playing poker in his free time and quickly became entrenched in the game, studying hours a day. Adam traveled around the country playing in some of the highest stakes No Limit and Pot Limit Omaha cash games in the world. Adam has made multiple World Series of Poker Final Tables, with his most notable finish coming in 2018 with a runner-up finish in the$10,000 Turbo Event. Adam has won millions of dollars in both cash game and tournament poker over the last 15 years. Adam’s second venture began with assembling a team of the best molecular scientists, mostly Merck and Amgen biochemists and formulators, and building out a multi-million dollar, 30,000 sq. ft. FDA/cGMP approved facility in Oxnard CA.
This is where Adam’s passion for biotech really began. His sports background allowed him to take this brand and bring in global icons around a strategic marketing plan activating the world’s most iconic athletes and celebrities. Adam developed this revolutionary technology in 2009. Using sublingual, buccal mucosal, and transdermal absorption directly to the bloodstream, by-passing the GI tract, Adam’s company Fuse Science completely changed the way consumers receive vitamins, electrolytes, nutrients, and medicines. Going direct to the bloodstream, bypassing the GI Tract, the platform technology was a game-changer. Adam self-funded this company privately for over 2 years, developing the product line and securing the IP. As Chief Executive Officer, Adam grew the company rapidly, seeing its market cap increase from $500,000 to over $100,000,000.
Adam put together one of the most impressive lists of athlete partners on the planet, signing Tiger Woods (including the rights to his bag for 5 years), Andy Murray, Tyson Chandler, Paul Pierce, Big Papi David Ortiz, Jose Bautista, Arian Foster, Paul Rodriguez, and many others. Adam’s deep-rooted relationships with the world’s top athletes and celebrities are his core group of friends along with business partners.
Adam's handpicked a Fortune25 management team, hiring the President of SC Johnson, CEO of Footlocker, Chief Scientific Officer for Johnson & Johnson, Clinical Director at Merck, Head of Duke Sports Medicine, and had over 100 employees. Adam brought Daymond John and Shark Branding in as partners as well. Adam has placed products in over 100,000locations, including Walgreens, CVS, Sports Authority, Dick’s, Duane Reade, 7-11, GNC, Walmart, Target, Costco, Vitamin Shoppe, and many others. Mr. Adler is currently managing The Adler Fund, investing in real-estate emerging growth companies with a focus on cybersecurity, cannabis, and biotechnology.