Spyware Checklist
Spyware Checklist
Spyware Checklist
SPYWARE CHECKLIST
Use this list to protect yourself against spyware & covert surveillance
Make sure you keep this list somewhere safe
If you are unsure how to do any of the below steps, Google it on a safe device or get the help of a trusted
friend, family member or social worker
What is spyware? Spyware is malware that can be installed on devices such as computers, tablets & smart
phones to secretly monitor a person’s private information. Spyware may access keystroke logging (all typed
information), photos/videos, social media accounts, Apps, contacts, notes, browsing history, call logs, text
messages, email, location, activate your camera, microphone or record calls. It may be used to delete things
off your device, block certain websites or numbers & may be remotely deleted.
□ □ □ □
1 General Don’t leave your PIN / password Log out of & close Don’t open suss
precautions devices where protect devices, devices/apps/ email attachments or
they can be easily change passwords accounts after use .exe files
accessed by
others
□ □ □ □ □
Update Always use private Set up new email Don’t use personal Set up 2-step
device browsing on safe device details in usernames, verification on
software emails or passwords accounts where
possible
Change □ □ □ □
device Turn off location Turn off cellular Turn off Wi-Fi Turn off Bluetooth
2
settings settings data
Spyware needs access to the internet to operate. Turning off these settings increases immediate safety.
You may need to change the setting on your children or family member’s devices.
Visit www.smartsafe.org.au for instructional videos on how to change these settings on your device.
Look for □ □ □ □
suss USBs or hard Look for anything Check new or Cover cameras on
3 objects drives in unsual around your unfamiliar objects/ devices with tape
computers or house, car, wallet, things you were
keyboards bags, keyring etc given
Cameras, microphones & tracking devices can be hidden in everyday objects like clocks, chargers, bags,
toys, jewellery or rear view mirrors. Some GPS trackers are small tiles or magnets.
Keystroke logging can be done through external devices that may look like a USB or hard drive.
Mechanics or Police can sometimes sweep a car if you think a GPS tracker has been installed.
Review □ □ □ □
your Apps Delete any Apps, Limit what you & Upgrade privacy & Check “mail
4 & accounts accounts & others share about security settings in forwarding” & “SMS
software you don’t you online Apps & accounts you forwarding” is not set
need or recognise keep up on your email or
device
BLOCK
NUMBER?
A factory reset is usually effective, but isn’t a 100% guarantee to remove Spyware. Google how to back up
contacts, photos & messages if you’re unsure. Be careful what you restore when using a backup – don’t
restore all Apps.
Changing a SIM card on a device won’t remove spyware. Getting a SIM & a new number is still a good
protective measure to keep you safe. To keep your number private, hide caller ID in your phone settings.
Did someone give you the device? Some devices can be purchased with spyware in-built so it can’t be
removed. Consider getting a new phone.
Escaping domestic violence? Call 1800-WESNET to see if you’re eligible for a free safe phone.
Do some research on anti-spyware & anti-virus software. Talk with an IT specialist or look for reviews on
reputable websites.
For free legal advice about technology-facilitated stalking or abuse, refer clients to Legal Aid NSW’s Domestic Violence Unit on
(02) 9219 6300