Is someone spying on me, even if I use malware scanners?

Nov 26, 2014, 3:19 AM | Updated: 3:19 am

Q: How do I know if the Detekt tool is safe to use?

Detekt is a somewhat controversial free scanning tool recently released by a German security researcher that is designed to uncover certain types of spy malware. The researcher, Claudio Guarnieri, released the tool in partnership with several human rights and privacy advocate groups, such as Amnesty International and Electronic Freedom Foundation.

With the amount of coverage and scrutiny being given to this tool by the security research world, I think it’s less of an issue of how safe it is and more of an issue of how useful it is.

It primarily focuses on two types of malware generally used for silent surveillance by governments and intelligence agencies, so this is not your garden variety malware detection tool. There are thousands of surveillance software tools available that the Detekt tool will not detect because it was really designed as a simple tool for journalists and activists to check for a very specific type of malware.

Since its release, the author has gone on to stress that it’s more of an awareness campaign than an antivirus tool as it’s intended to expose known illegitimate state surveillance.

Other security researchers have detailed the technical shortcomings of the tool, which only runs on certain versions of Windows.

Unless you believe that you’re being targeted by a government or spy agency, the tool isn’t really of much use, as most of us are more likely to be compromised by a random act of hacking that generally occur when security software and system updates are not kept up to date.

A rigged website, file attachment or social media posting can silently exploit known security holes and execute a “drive-by download” to make its way into your computer.

If you’re concerned about general privacy protection against the silent monitoring of your computer, there are several tools available that will do a much better job than Detekt.

Both Zemana AntiLogger and SpyShelter provide anti-key logging, anti-webcam logging, anti-screen logging and anti-sound logging tools.

These programs are designed to detect and block commonly used malware that attempts to silently record your activities and works in conjunction with your antivirus program.

Cybercriminals employ logging malware to steal valuable information, such as usernames, passwords and financial account credentials that are silently sent to them as log files.

Many other anti-logging programs available simply look for the telltale activity generated by spy software, but both of these programs employ real-time protection to prevent exploitation in the first place.

Both companies also offer keystroke encryption, so even if a keylogger sneaks past, the resulting log files will look like encrypted gibberish.

Both companies offer a limited feature free version or a full-featured pro version that includes the entire protection suite for about $30 and trial versions.

Data Doctors

(Pexels Photo)...
Ken Colburn, Data Doctors

What to know about the Marco Polo video chat app

The Marco Polo app is a video chat program that’s like a walkie-talkie conversation instead of a live session.
1 day ago
...
Ken Colburn, Data Doctors

Here are some tips on how to speed up slow starting computers

Here are some ways you can identify and solve potential issues that may be causing your computer to start up slower than normal.
8 days ago
(AP Photo/Jenny Kane, File)...
Data Doctors

An explanation of how new credit cards have information stolen

If you've ever wondered how people can crack a new credit card, here's a rundown and a brief explanation on what thieves could be doing.
15 days ago
(Pexels Photo)...
Ken Colburn, Data Doctors

Here are the differences between Google Chrome and Microsoft Edge

Half of the United States uses Google Chrome as a default browser, but here are the key differences between Chrome and Microsoft Edge.
22 days ago
(Pexels Photo)...
Data Doctors

Tips on how and when to use the iPhone screen recording feature

Here are some tips on when and how to use the the screen recording feature located on the dropdown bar on your iPhone.
29 days ago
In this photo illustration a spam 'Phishing' email is displayed on a laptop screen on March 21,2022...
Data Doctors

Tips and tools to detect and avoid computer phishing scams

Far and away, the method of choice for compromising users is through sophisticated phishing messages in email, via text messaging and through social media accounts.
1 month ago

Sponsored Articles

(Desert Institute for Spine Care photo)...
DESERT INSTITUTE FOR SPINE CARE

Why DISC is world renowned for back and neck pain treatments

Fifty percent of Americans and 90% of people at least 50 years old have some level of degenerative disc disease.
...
Quantum Fiber

How high-speed fiber internet can improve everyday life

Quantum Fiber supplies unlimited data with speeds up to 940 mbps, enough to share 4K videos with coworkers 20 times faster than a cable.
...
Day & Night Air Conditioning, Heating and Plumbing

Here are 4 signs the HVAC unit needs to be replaced

Pool renovations and kitchen upgrades may seem enticing, but at the forefront of these investments arguably should be what residents use the most. In a state where summertime is sweltering, access to a functioning HVAC unit can be critical.
Is someone spying on me, even if I use malware scanners?