{"id":15687,"date":"2019-07-01T10:10:02","date_gmt":"2019-07-01T18:10:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/07\/01\/news-9435\/"},"modified":"2019-07-01T10:10:02","modified_gmt":"2019-07-01T18:10:02","slug":"news-9435","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/01\/news-9435\/","title":{"rendered":"Helping survivors of domestic abuse: What to do when you find stalkerware"},"content":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Mon, 01 Jul 2019 16:51:59 +0000<\/strong><\/p>\n<p>We\u2019re going to talk about something different today. We\u2019re going to talk about domestic abuse. <\/p>\n<p>Earlier this year, cybersecurity company Kaspersky Lab <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2019_could-someone-be-spying-on-you-through-your-phone\" target=\"_blank\">announced<\/a> that the latest upgrade to its Android app would inform users about whether their devices were running stealthy, behind-the-scenes monitoring apps sometimes referred to as <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/stalkerware\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"stalkerware (opens in a new tab)\">stalkerware<\/a>. <\/p>\n<p>This type of software can track unsuspecting victims\u2019 locations, record phone calls, peer into text messages and emails, pry into locally-stored photos and videos, and rifle through web browsing activity, all while hidden from view.  <\/p>\n<p>Though often, and shamelessly, advertised as a tool for parents to track the activity of their children, these apps are commonly used against survivors of domestic abuse. <\/p>\n<p>It serves as no surprise. Stalkerware coils around a victim\u2019s digital life, giving abusive partners what they crave: control. <\/p>\n<p>Electronic Frontier Foundation Cybersecurity Director Eva Galperin, who pushed Kaspersky Labs into improving its product, told Motherboard at the time of the company\u2019s announcement:<\/p>\n<p>\u201cI would really like to see other [antivirus] companies follow suit, so that I can recommend them instead of just one company that has shown that they are committed to doing this\u2026 I\u2019d like to see this be the industry standard so it doesn&#8217;t matter which product you&#8217;re downloading.\u201d<\/p>\n<p>Malwarebytes stands up to this commitment, <a rel=\"noreferrer noopener\" aria-label=\"as we have for years (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/09\/spyware-installed-on-android-devices-to-stalk-domestic-abuse-victims\/\" target=\"_blank\">as we have for years<\/a>. <\/p>\n<p>But starting today, we\u2019re going to do more than improve our stalkerware detection capabilities. We\u2019re going to help survivors understand this danger and know what to do if they&#8217;re being digitally tracked. <\/p>\n<h3>Finding proof of stalkerware<\/h3>\n<p>Stalkerware presents a unique detection problem for its victims\u2014it often hides itself from public view, and any attempt to find it could be recorded by the stalkerware itself. <\/p>\n<p>Further, the US government has done little to help. Despite a previous FBI investigation that led to the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/washingtondc\/news\/press-releases\/federal-court-shuts-down-spyware-product-permanently\" target=\"_blank\">court-ordered shut down of the stalkerware app StealthGenie<\/a>, countless other stalkerware apps still operate today. <\/p>\n<p>According to a <a href=\"https:\/\/citizenlab.ca\/2019\/06\/the-predator-in-your-pocket-a-multidisciplinary-assessment-of-the-stalkerware-application-industry\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">new study by the University of Toronto\u2019s research and public policy project CitizenLab<\/a>, the most popular stalkerware apps today in the US, Canada, and Australia are FlexiSpy, Highster Mobile, Hoverwatch, Mobistealth, mSpy, TeenSafe, TheTruthSpy, and Cerberus. <\/p>\n<p>Malwarebytes Labs has previously written about the technological signs of stalkerware\u2014<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">quickly-depleting battery life, increased data usage, and longer response times than usual<\/a>\u2014but we wanted to explore what stalkerware looks like from a behavioral aspect. We spoke to multiple domestic abuse networks and advocacy groups, and one troubling fact arose repeatedly:<\/p>\n<p>Symptoms of stalkerware are not <em>proof<\/em> of stalkerware. <\/p>\n<p>Erica Olsen, director of the Safety Net project for the National Network to End Domestic Violence, said her organization consistently hears stories from domestic abuse survivors who are struggling to explain how their partners know about their phone calls, text message conversations, emails, and even visited locations.<\/p>\n<p>\u201cSurvivors could come to law enforcement and say \u2018My ex knows about the text messages I sent, and I don\u2019t know how they know that,\u2019\u201d Olsen said.  But, she said, the signs don&#8217;t always guarantee the use stalkerware. <\/p>\n<p>\u201cCould the [recipient] have just told [the ex]?\u201d Olsen said. <\/p>\n<p>In determining the presence of stalkerware, Olsen said survivors should assess several factors: <\/p>\n<ul>\n<li>Does their abusive partner have physical access to their device\u2014a common situation for couples who live together? <\/li>\n<li>Does their abusive partner know the passcode to unlock a device\u2014another situation that depends on whether an abusive partner even allows for that level of agency and freedom from their victim. <\/li>\n<li>Can their abusive partner view call logs on their device, learning who was called, how often, and for how long? <\/li>\n<li>Does their abusive partner know the <em>content<\/em> of phone calls? <\/li>\n<li>For domestic abuse survivors who have physically escaped their abuser, do their abusers still know about recently-taken photographs, locations visited, and any information that is typically locked behind an account or device passcode?<\/li>\n<\/ul>\n<p>Further, Olsen said that domestic abuse survivors should study <em>how <\/em>the private information is being used by an abuser. <\/p>\n<p>\u201cAbusers will end up hinting at all the things they know that they shouldn\u2019t know,\u201d Olsen said. \u201cThat is the most frequent thing we hear from survivors, advocates, and law enforcement\u2014the number one thing is identifying that an abuser knows ways too much.\u201d <\/p>\n<p>Olsen continued: \u201cThey know text messages, emails, they have access to accounts logged into via [the survivor\u2019s] phone. That\u2019s when we immediately have to start talking to survivors about what they think is safe.\u201d <\/p>\n<p>While every safety plan is unique, and every domestic abuse situation nuanced, Olsen offered one top-level piece of advice that applies to all survivors: Trust yourself. You know the feeling of being watched and controlled\u2014whether through physical, emotional, mental, or digital means. You should trust those feelings and never discount your own concerns.&nbsp; <\/p>\n<p>The following ideas do not present a catch-all \u201csolution\u201d to finding stalkerware on a device. Instead, they present information that will hopefully guide survivors toward safety.<\/p>\n<h4>Evaluate your own level of safety<\/h4>\n<p>Determining what is safe for you is crucial. What you discover in this process can impact what other steps you take after learning about or suspecting the presence of stalkerware on your device. <\/p>\n<p>Ask yourself several questions about what steps you can reliably take. <\/p>\n<ul>\n<li>Do you have people you can ask for support? <\/li>\n<li>Can you communicate with those people from a safe, non-monitored device? <\/li>\n<li>Can you change your social media account passwords? <\/li>\n<li>Can you change your own device passcode? <\/li>\n<li>Are you allowed to have a device passcode? <\/li>\n<li>Can you install antivirus and anti-malware programs on your own device? <\/li>\n<li>What would be the consequences of your abusive partner discovering that you are trying to get rid of stalkerware? <\/li>\n<li>Do you want to bring in law enforcement? <\/li>\n<\/ul>\n<p>If all this seems overwhelming, remember that the <a href=\"https:\/\/www.thehotline.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"National Domestic Violence Hotline (opens in a new tab)\">National Domestic Violence Hotline<\/a> is there to help. <\/p>\n<h4>Your every move might be recorded<\/h4>\n<p>When determining your own level of safety, it\u2019s important to remember that everything you do on your compromised device could be recorded and watched by an abusive partner. That means your web browsing activity, your text messages, your emails, and all of your written correspondence could be far from private. <\/p>\n<h4>Know what apps are on your phone and what permissions they\u2019re allowed<\/h4>\n<p>Olsen advised that domestic abuse survivors know what apps are on their devices at any given moment. While this guideline does not reliably catch hidden stalkerware apps, it does give you an opportunity to understand what other apps might have been installed on your device in an attempt to surveil you. <\/p>\n<p>Remember, abusive partners do not need stalkerware to victimize and control their partners. Instead, Olsen said, abusers can rely on technology <em>misuse. <\/em><\/p>\n<p>\u201cThe vast majority of our work is in looking at misuses of general technologies that have 100 different good uses, that are never intended to be misused,\u201d Olsen said. \u201cThe ownership [of abuse] is always on the abuser for their behavior. If you remove technology, you\u2019re still going to have an abusive person.\u201d <\/p>\n<p>Shaena Spoor, program assistant with W.O.M.A.N. Inc., offered a couple of examples of technology misuses that she has heard about. <\/p>\n<p>\u201cWe had some concerns with Snap Maps,\u201d Spoor said about the <a href=\"https:\/\/www.theverge.com\/2017\/6\/21\/15846358\/snapchat-snap-map-location-sharing-feature-announced\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Snapchat feature rolled out in 2017 that let users find their friends\u2019 locations<\/a>. Every user that agreed to share their location had their locations updated with every app use. <\/p>\n<p>\u201cFor some people, they didn\u2019t realize that locations had been [turned] on,\u201d Spoor said. \u201cIf you don\u2019t use the app very often, you\u2019re just sitting on a map, super findable.\u201d <\/p>\n<p>Spoor said she also heard of domestic abuse survivors whose locations were tracked through the use of the location-tracking product Tile. Though sold  to legitimately track luggage, wallets, and purses, domestic abusers can also sneak the small plastic device into your jacket or work bag. When the abuser loads up the Tile app, they can then get a real-time result of that device, and thus, your location. <\/p>\n<p>\u201cPeople use Tile, for example, and hide them in survivor\u2019s stuff,\u201d Spoor said. \u201c[Survivors] are showing up at domestic violence shelters and finding it hidden in a bag.\u201d <\/p>\n<h4>Create new online account logins and passwords from a safe device<\/h4>\n<p>This one comes straight from the National Network to End Domestic Violence\u2019s <a href=\"https:\/\/www.techsafety.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Technology Safety project<\/a>. You should think about making new account logins and passwords. <\/p>\n<p>As one of the the <a href=\"https:\/\/www.techsafety.org\/computerspyware\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Technology Safety project&#8217;s many resource said<\/a>:<\/p>\n<p>\u201cIf you suspect that anyone abusive can access your email or Instant Messaging (IM), consider creating additional email\/IM accounts on a safer computer. Do not create or check new email\/IM accounts from a computer that might be monitored.\u201d<\/p>\n<p>The Tech Safety resource also advises you to open new accounts with no identifying information, like real names or nicknames. This step should be considered for all important online accounts, including your banking and social media accounts. <\/p>\n<p>Always remember to do this from a safe computer that is not being monitored. <\/p>\n<h4>Factory reset or toss your device<\/h4>\n<p>Multiple organizations recommended that any stalkerware victim take immediate steps to toss, or wipe clean, their current device. There are a few options:<\/p>\n<ul>\n<li>Toss your device and buy a new one<\/li>\n<li>Factory reset your device<\/li>\n<li>Keep your compromised device, but purchase a new phone that you use for confidential conversations<\/li>\n<\/ul>\n<p>Olsen advised that every situation has its own unique challenges, and she urged domestic abuse survivors to consider the potential outcomes of whatever option they choose. She said her organization works closely with domestic abuse survivors to come up with the best plan for them. <\/p>\n<p>\u201cWe think about the abuser, who no longer has remote access to [the survivor]\u2014they will try to get physical access, and that is a real concern which absolutely could happen,\u201d Olsen said. \u201cIf the survivor thinks that [might happen], we try alternatives\u2014buying a pay-as-you-go phone, use it to have critical conversations, private ones, but still keep the regular phone for silly things and to keep the [abuser] at bay.\u201d <\/p>\n<p>Chris Cox, founder of Operation Safe Escape, which works directly with domestic abuse networks and shelters and law enforcement to provide operational and cybersecurity support, echoed similar advice. <\/p>\n<p>\u201cWhat we always advise, consistently, if an abuser ever had access to the device, leave it behind. Never touch it. Get a burner,\u201d Cox said, using the term \u201cburner\u201d to refer to a prepaid phone, purchased with cash. \u201cYou have to assume the device and the accounts are compromised.\u201d<\/p>\n<p>Further, Cox cautioned against survivors trying to wipe stalkerware from a device, as it could introduce a \u201cnew vulnerability\u201d in which an abuser learns\u2014through the stalkerware itself\u2014that their victim is trying to thwart the abuser. <\/p>\n<p>Instead, Cox said, \u201cwhenever possible, the device is left behind.\u201d <\/p>\n<h4>Approach law enforcement<\/h4>\n<p>Working with the police is a step taken by survivors who want to take legal action, whether that means eventually obtaining a restraining order or bringing charges against their abuser. <\/p>\n<p>Because of this step\u2019s nuance, you should take caution. <\/p>\n<p>Olsen said that, of the successful attempts she has learned of survivors working with local police, the survivors already have a firm safety plan in place, and they have built a relationship with domestic abuse shelters and advocates. She said that, together with their support network, survivors have managed to get confessions out of their abusers. <\/p>\n<p>But, Olsen stressed, trying to get an abuser to admit to their abusive and potentially criminal behavior is <em>not <\/em>a step to be taken alone.<\/p>\n<p>\u201cI do not suggest doing this in isolation, but if they\u2019re working with advocates, I have heard of some survivors strategically communicating with abusers,\u201d Olsen said. \u201cIt is amazing how many times abusers admit to [using stalkerware].\u201d <\/p>\n<p>Also, survivors should be wary of how police can be used <em>against <\/em>them, said Cox. <\/p>\n<p>\u201cAbusers, as a whole, are adept at using the law as a weapon,\u201d Cox said. \u201cIf a phone belongs to a victim, and it happens to be in the abuser\u2019s name, if the victim leaves and the abuser reports it stolen, [law enforcement] are used as a weapon to track the victim down.\u201d<\/p>\n<h4>Call the National Domestic Violence Hotline <\/h4>\n<p>If you find stalkerware on your device, or you have strong suspicions about an abusive partner knowing too much about your personal life\u2014with details from text messages and knowledge of private photos\u2014call the hotline from a safe device. <\/p>\n<p>The number for the National Domestic Violence Hotline is <strong>1\u2212800\u2212799\u22127233<\/strong>. <\/p>\n<p>The hotline\u2019s trained experts can help you find the safest path forward, all while maintaining your confidentiality. <\/p>\n<h4>Seek help from various online resources<\/h4>\n<p>If you want to find more information online, from a safe device, read through any of these resources about dealing with domestic abuse, stalkerware, and the misuse of technology:<\/p>\n<ul>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.thehotline.org\/\" target=\"_blank\">The National Domestic Violence Hotline<\/a><\/li>\n<li>The <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.techsafety.org\/resources-survivors\/technology-safety-plan\" target=\"_blank\">Survivor Toolkit<\/a> \u2013 National Network to End Domestic Violence<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.techsafety.org\/12tipscellphones\" target=\"_blank\">\u201c12 Tips on Cell Phone Safety and Privacy\u201d<\/a> \u2013 National Network to End Domestic Violence<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.techsafety.org\/blog?tag=smartphones\" target=\"_blank\">\u201cWhat Are Survivors\u2019 Options for Free Phones?\u201d<\/a> \u2013 National Network to End Domestic Violence <\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.techsafety.org\/computerspyware\" target=\"_blank\">\u201cWho\u2019s Spying on Your Computer?\u201d<\/a> \u2013 National Network to End Domestic Violence<\/li>\n<li><\/li>\n<\/ul>\n<p>Malwarebytes has also written a few articles on types of technology, malicious or not, that are often abused to their victims&#8217; detriment. Awareness of what&#8217;s out there and how it can be used against you can help you stay safe:<\/p>\n<ul>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Spyware installed on Android devices to stalk domestic abuse victims (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/09\/spyware-installed-on-android-devices-to-stalk-domestic-abuse-victims\/\" target=\"_blank\">Spyware installed on Android devices to stalk domestic abuse victims<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"IoT domestic abuse: What can we do to stop it? (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/iot-domestic-abuse-can-stop\/\" target=\"_blank\">IoT domestic abuse: What can we do to stop it?<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"When spyware goes mainstream (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/\" target=\"_blank\">When spyware goes mainstream<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/10\/mobile-menace-monday-beware-of-monitoring-apps\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Mobile Menace Monday: beware of monitoring apps (opens in a new tab)\">Mobile Menace Monday: beware of monitoring apps<\/a><\/li>\n<\/ul>\n<p>And if you are able to install an anti-malware program on your mobile device, running a scan with <a rel=\"noreferrer noopener\" aria-label=\"Malwarebytes for Android (opens in a new tab)\" href=\"http:\/\/www.malwarebytes.com\/android\" target=\"_blank\">Malwarebytes for Android<\/a> can help you detect and remove stalkerware apps\u2014as well as keep a log of which apps were installed on your phone, which is valuable information if you choose to work with law enforcement.<\/p>\n<p>We&#8217;re here for you. We care. And we&#8217;ll always do what we can to help users have a safe online\u2014and offline\u2014experience with technology.<\/p>\n<p>Stay tuned for our next article in our stalkerware series, which will explore which monitoring apps are safe for parents to use, and which should be avoided. Stay safe. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2019\/07\/helping-survivors-of-domestic-abuse-what-to-do-when-you-find-stalkerware\/\">Helping survivors of domestic abuse: What to do when you find stalkerware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2019\/07\/helping-survivors-of-domestic-abuse-what-to-do-when-you-find-stalkerware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Mon, 01 Jul 2019 16:51:59 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/stalkerware\/2019\/07\/helping-survivors-of-domestic-abuse-what-to-do-when-you-find-stalkerware\/' title='Helping survivors of domestic abuse: What to do when you find stalkerware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/Stalkerware-woman-on-phone-man-outside-car.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Starting today, we\u2019re doing more to protect stalkerware victims than improve our detection capabilities. We\u2019re helping survivors understand how to tell if they&#8217;re being watched on their devices\u2014and how to safely get out of the situation.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/stalkerware\/\" rel=\"category tag\">Stalkerware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/burner\/\" rel=\"tag\">burner<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/burner-phone\/\" rel=\"tag\">burner phone<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cerberus\/\" rel=\"tag\">Cerberus<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/domestic-abuse\/\" rel=\"tag\">domestic abuse<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/domestic-violence\/\" rel=\"tag\">domestic violence<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/electronic-frontier-foundation\/\" rel=\"tag\">Electronic Frontier Foundation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/flexispy\/\" rel=\"tag\">FlexiSpy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/highster-mobile\/\" rel=\"tag\">Highster Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hoverwatch\/\" rel=\"tag\">Hoverwatch<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/kaspersky\/\" rel=\"tag\">kaspersky<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobistealth\/\" rel=\"tag\">MobiStealth<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mspy\/\" rel=\"tag\">mspy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/national-domestic-violence-hotline\/\" rel=\"tag\">national domestic violence hotline<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/national-network-to-end-domestic-violence\/\" rel=\"tag\">National Network to End Domestic Violence<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/operation-safe-escape\/\" rel=\"tag\">Operation Safe Escape<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/safety-net\/\" rel=\"tag\">Safety Net<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/snap-maps\/\" rel=\"tag\">Snap Maps<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/snapchat-maps\/\" rel=\"tag\">Snapchat Maps<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyware\/\" rel=\"tag\">spyware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stalkerware\/\" rel=\"tag\">stalkerware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stealthgenie\/\" rel=\"tag\">StealthGenie<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/surveillanceware\/\" rel=\"tag\">surveillanceware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/teensafe\/\" rel=\"tag\">TeenSafe<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/thetruthspy\/\" rel=\"tag\">TheTruthSpy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tile\/\" rel=\"tag\">Tile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/w-o-m-a-n\/\" rel=\"tag\">W.O.M.A.N.<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/w-o-m-a-n-inc\/\" rel=\"tag\">W.O.M.A.N. Inc<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/woman-inc\/\" rel=\"tag\">Woman INc<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/stalkerware\/2019\/07\/helping-survivors-of-domestic-abuse-what-to-do-when-you-find-stalkerware\/' title='Helping survivors of domestic abuse: What to do when you find stalkerware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2019\/07\/helping-survivors-of-domestic-abuse-what-to-do-when-you-find-stalkerware\/\">Helping survivors of domestic abuse: What to do when you find stalkerware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22139,22140,22141,10207,2296,11247,22142,22143,22144,11125,22145,19408,22146,22147,22148,22149,22150,22151,10443,19409,22152,18209,18502,22153,22154,22155,22156,22157],"class_list":["post-15687","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-burner","tag-burner-phone","tag-cerberus","tag-domestic-abuse","tag-domestic-violence","tag-electronic-frontier-foundation","tag-flexispy","tag-highster-mobile","tag-hoverwatch","tag-kaspersky","tag-mobistealth","tag-mspy","tag-national-domestic-violence-hotline","tag-national-network-to-end-domestic-violence","tag-operation-safe-escape","tag-safety-net","tag-snap-maps","tag-snapchat-maps","tag-spyware","tag-stalkerware","tag-stealthgenie","tag-surveillanceware","tag-teensafe","tag-thetruthspy","tag-tile","tag-w-o-m-a-n","tag-w-o-m-a-n-inc","tag-woman-inc"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15687"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15687\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15687"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}