Spyware Checklist

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2


SPYWARE CHECKLIST
 Use this list to protect yourself against spyware & covert surveillance
 Make sure you keep this list somewhere safe
 If you are unsure how to do any of the below steps, Google it on a safe device or get the help of a trusted
friend, family member or social worker

What is spyware? Spyware is malware that can be installed on devices such as computers, tablets & smart
phones to secretly monitor a person’s private information. Spyware may access keystroke logging (all typed
information), photos/videos, social media accounts, Apps, contacts, notes, browsing history, call logs, text
messages, email, location, activate your camera, microphone or record calls. It may be used to delete things
off your device, block certain websites or numbers & may be remotely deleted.

□ □ □ □
1 General Don’t leave your PIN / password Log out of & close Don’t open suss
precautions devices where protect devices, devices/apps/ email attachments or
they can be easily change passwords accounts after use .exe files
accessed by
others

□ □ □ □ □
Update Always use private Set up new email Don’t use personal Set up 2-step
device browsing on safe device details in usernames, verification on
software emails or passwords accounts where
possible

 See the Password Checklist.


 Private browsing can be used on all devices including phones. It won’t save passwords or your browsing
history. Downloads will still be saved & need to be manually deleted if you are concerned.
 Set up a new email address on a safe computer. Don’t use any identifying features in this email address
(e.g., your name, year of birth).

Change □ □ □ □
device Turn off location Turn off cellular Turn off Wi-Fi Turn off Bluetooth
2
settings settings data

 Spyware needs access to the internet to operate. Turning off these settings increases immediate safety.
 You may need to change the setting on your children or family member’s devices.
 Visit www.smartsafe.org.au for instructional videos on how to change these settings on your device.

Look for □ □ □ □
suss USBs or hard Look for anything Check new or Cover cameras on
3 objects drives in unsual around your unfamiliar objects/ devices with tape
computers or house, car, wallet, things you were
keyboards bags, keyring etc given

 Cameras, microphones & tracking devices can be hidden in everyday objects like clocks, chargers, bags,
toys, jewellery or rear view mirrors. Some GPS trackers are small tiles or magnets.
 Keystroke logging can be done through external devices that may look like a USB or hard drive.
 Mechanics or Police can sometimes sweep a car if you think a GPS tracker has been installed.
Review □ □ □ □
your Apps Delete any Apps, Limit what you & Upgrade privacy & Check “mail
4 & accounts accounts & others share about security settings in forwarding” & “SMS
software you don’t you online Apps & accounts you forwarding” is not set
need or recognise keep up on your email or
device

 See www.esafety.gov.au/women for videos on how to check “mail forwarding” settings.


 Some Apps allow you to upgrade security settings for two-step verification, notifications of logins on
unknown devices & to show recent login times & locations. Facebook allows you to download your data.
Make your
devices
□ □ □ □
5 Do a factory reset Install anti-spyware Consider getting a Update the settings
safer Apps & software on new device on your new/safer
all devices device

BLOCK
NUMBER?

 A factory reset is usually effective, but isn’t a 100% guarantee to remove Spyware. Google how to back up
contacts, photos & messages if you’re unsure. Be careful what you restore when using a backup – don’t
restore all Apps.
 Changing a SIM card on a device won’t remove spyware. Getting a SIM & a new number is still a good
protective measure to keep you safe. To keep your number private, hide caller ID in your phone settings.
 Did someone give you the device? Some devices can be purchased with spyware in-built so it can’t be
removed. Consider getting a new phone.
 Escaping domestic violence? Call 1800-WESNET to see if you’re eligible for a free safe phone.
 Do some research on anti-spyware & anti-virus software. Talk with an IT specialist or look for reviews on
reputable websites.

WARNING SIGNS YOUR DEVICE MAY BE INFECTED WITH SPYWARE


Device battery Device Device Unexplained Changes to Unexplained Unable to call
draining faster constantly switching itself spikes in data your device, activity on your certain
than usual checking for on & off usage e.g., Apps, social media or numbers,
location emails, SMS email access
deleted websites

Warning signs for iPhones & iPads


• Some spyware requires an iPhone or iPad to be “jailbroken” to operate.
• If jailbroken, an App called “Cydia” may be installed on your device. It can be hidden so it’s not visible on the device.
• Search for “Cydia” in Spotlight. If you find Cydia, your phone has been jailbroken without your knowledge.
• Spyware may be in installed inside Cydia with a name like “IphoneInternalService” (MSpy).

Precautions to increase safety on an iPhone or iPad


• Update your iOS – this may remove jailbreaks & increase security.
• Turn off iCloud backup. iCloud may be used to spy remotely where the phone is not jailbroken.
• A factory reset is the most effective way to remove a jailbreak on an Apple device. Cydia icon SuperUser
• Consider taking your device to an Apple Genius bar to be checked. icon

Warning signs for Android devices


• Some spyware attaches to your Android’s security settings as a Phone Administrator. Look around these settings (go to
Settings > Security > Device Administrators) & your Apps for anything strange.
• Some spyware requires “rooting” on an Android device for full access to your installed Apps. Sometimes an App called
“SuperUser” is used for rooting. Search your device for “SuperUser” or “SU.” Free “root checker” Apps can let you know if your
phone is rooted. Often your device’s operating system will not be able to update when it is rooted.
• Some spyware can be uninstalled through security settings. E.g., Mspy may be uninstalled in Phone Settings > Security >
Device Administrators > Update Service > Deactivate > Get back to Settings > Apps > Update Service > Uninstall.
• A factory reset will not unroot an Android device. Google how to do this or get assistance from your Service Provider.

Learn more about online safety at www.esafety.gov.au

For free legal advice about technology-facilitated stalking or abuse, refer clients to Legal Aid NSW’s Domestic Violence Unit on
(02) 9219 6300

You might also like