Skip to main content

All Questions

Tagged with
1 vote
0 answers
179 views

Detecting hard to detect stalkerware - a theoretical question

Suppose you have a stalker and this person has access to professional advice. Suppose your Android phone was hacked by means of physical access, i.e. known unlock pattern or stolen password note, with ...
LiamNiam's user avatar
-2 votes
1 answer
257 views

I have a spyware installed on my laptop and it is filtering my internet usage in real time. How can i bypass the spyware and search the internet [duplicate]

Both my Laptop and phone are compromised, a spyware was installed by someone who was close to me. Now I am not able to browse the internet fully. Search results on both Google and onion engines are ...
sushrut ojha's user avatar
0 votes
2 answers
241 views

For someone who deals with dangerous files and websites frequently what is the way to avoid getting infected by spyware/virus permanently?

For someone who deals with dangerous files and websites frequently or even for the general user what is the way to avoid getting infected by spyware/virus permanently? I am looking to buy a new laptop ...
User4857's user avatar
1 vote
4 answers
429 views

Is doc file really modifying registry in Windows?

Been given a .docx file to check whether it has a virus or something, ran McAfee and SuperAntiSpyware on it and results came back negative so I though it was good and proceeded to open it, just a file ...
Docfieguy's user avatar
0 votes
2 answers
2k views

Can spyware be downloaded and installed on Android phone in a minute or less?

Following Scenario: You unlock your phone and you give it to someone so they can promply check it out (since it's a new phone). Now let's presume that the very exact person has intentions to install ...
Shaki49's user avatar
5 votes
2 answers
2k views

IoCs of Pegasus spyware penetration

What are the indicators of compromise (IoCs) that indicate methods used by the Pegasus spyware on mobile phones? How is penetration still possible when the latest and up-to-date OS of the phone is ...
HadidAli's user avatar
  • 570
0 votes
2 answers
6k views

Is it possible for someone to spy on an Android phone without using spying apps?

Can a “bad guy” spy on an android phone without installing spy apps (those apps that require payment)? By “spying”, I mean using key logger, screenshots, read messages and so on. Is it possible to spy ...
user avatar
1 vote
0 answers
164 views

Android System Update Spyware Can Steal Your Photos, Money, Record Calls and Track You Too. What to do if this happens? [closed]

I came across this website and suddenly I got worried. What worries me is apart from the system update threat mentioned I have been visiting so many sites, clicked on pop-ups, downloaded apps from ...
Tea is life's user avatar
2 votes
4 answers
710 views

Can a antivirus software detect a malware that steals data?

For example, consider a software that wants to package all txt files in the /user/Desktop directory and upload them to its own server. I am not a programmer, but I know it can be done very easily with ...
birisix's user avatar
  • 23
1 vote
3 answers
2k views

Can Android spyware like Pegasus survive flashing of a new ROM?

I live in a country that is not fully authoritarian but is increasingly illiberal. State agencies have been caught misusing spyware to target activists and dissidents on multiple occasions. Given ...
user251709's user avatar
-1 votes
1 answer
201 views

Why governments use spywares instead of just redirecting traffic to their own servers by announcing a new path on BGP?

I was reading about The Hacking Team on Wikipedia. It produces "offensive intrusion and surveillance capabilities" and sells it to "to governments, law enforcement agencies". Its ...
robertspierre's user avatar
0 votes
1 answer
228 views

Desperate for removing spywares from both iPhone and Mac PC [duplicate]

I hope this is the correct stackexchange website to ask this, if it's not I'm sorry. Some time ago I started giving private lectures to a girl and she told me, a computer engineering student, that ...
Baffo rasta's user avatar
-2 votes
1 answer
269 views

Android tv box has been compromised [closed]

how can I get remote access to android box the the other people has to it ?
Pali Brown's user avatar
1 vote
2 answers
465 views

Can potential NSA spyware be detected and/or removed?

Just out of curiosity (and because it sounds fascinating) . With all the Snowden revelations, it sounds like nsa has the ability to infect computers with some sort of spyware. I'm asumming these ...
Mounir Sita's user avatar
3 votes
0 answers
176 views

Under what conditions can malware bypass macOS Catalina's permission system? [closed]

Catalina has some new security features which include System Preferences > Security & Privacy features, which requires apps to request access to specific computer functionality such as camera, ...
user225844's user avatar

15 30 50 per page
1
2 3 4 5