Is someone spying on me, even if I use malware scanners?

Nov 26, 2014, 3:19 AM | Updated: 3:19 am

Q: How do I know if the Detekt tool is safe to use?

Detekt is a somewhat controversial free scanning tool recently released by a German security researcher that is designed to uncover certain types of spy malware. The researcher, Claudio Guarnieri, released the tool in partnership with several human rights and privacy advocate groups, such as Amnesty International and Electronic Freedom Foundation.

With the amount of coverage and scrutiny being given to this tool by the security research world, I think it’s less of an issue of how safe it is and more of an issue of how useful it is.

It primarily focuses on two types of malware generally used for silent surveillance by governments and intelligence agencies, so this is not your garden variety malware detection tool. There are thousands of surveillance software tools available that the Detekt tool will not detect because it was really designed as a simple tool for journalists and activists to check for a very specific type of malware.

Since its release, the author has gone on to stress that it’s more of an awareness campaign than an antivirus tool as it’s intended to expose known illegitimate state surveillance.

Other security researchers have detailed the technical shortcomings of the tool, which only runs on certain versions of Windows.

Unless you believe that you’re being targeted by a government or spy agency, the tool isn’t really of much use, as most of us are more likely to be compromised by a random act of hacking that generally occur when security software and system updates are not kept up to date.

A rigged website, file attachment or social media posting can silently exploit known security holes and execute a “drive-by download” to make its way into your computer.

If you’re concerned about general privacy protection against the silent monitoring of your computer, there are several tools available that will do a much better job than Detekt.

Both Zemana AntiLogger and SpyShelter provide anti-key logging, anti-webcam logging, anti-screen logging and anti-sound logging tools.

These programs are designed to detect and block commonly used malware that attempts to silently record your activities and works in conjunction with your antivirus program.

Cybercriminals employ logging malware to steal valuable information, such as usernames, passwords and financial account credentials that are silently sent to them as log files.

Many other anti-logging programs available simply look for the telltale activity generated by spy software, but both of these programs employ real-time protection to prevent exploitation in the first place.

Both companies also offer keystroke encryption, so even if a keylogger sneaks past, the resulting log files will look like encrypted gibberish.

Both companies offer a limited feature free version or a full-featured pro version that includes the entire protection suite for about $30 and trial versions.

Data Doctors

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are which electronics are OK in checked baggage

The primary determinant of what is safe to check in baggage is today’s most common battery technology: Lithium Ion.

7 days ago

DNS can help Arizonans protect their online security...

Ken Colburn, Data Doctors

How Arizonans can protect their cyber safety through DNS

DNS stands for Domain Name Service. It's is a vital element of Internet infrastructure all Arizonans should know about when working online.

14 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are some useful Windows keyboard shortcuts

Keyboard shortcuts are one of the most underutilized features of any operating system and Windows 11 has many new ones.

21 days ago

Depending on the size of your home or how far outside your home you want the signal to be usable, r...

Ken Colburn, Data Doctors

Here’s how to choose the best WiFi router location

Depending on the size of your home or how far outside your home you want the signal to be usable - for items like security cameras - router placement is critical.

1 month ago

(Pexels photo)...

Ken Colburn, Data Doctors

Here’s how to use macros safely and effectively

Creating a macro is the process of recording keystrokes and mouse clicks for repetitive tasks within a document or spreadsheet.

1 month ago

Which smart phone is right for you? (Photo by Jaap Arriens/NurPhoto via Getty Images)...

Ken Colburn, Data Doctors

Tips for buying smartphones: A used edition could be right for you

The yearly improvement in smartphone technology leads many people to get rid of perfectly good smartphones for the ‘latest and greatest.'

2 months ago

Sponsored Articles


DISC Desert Institute for Spine Care

Sciatica pain is treatable but surgery may be required

Sciatica pain is one of the most common ailments a person can face, and if not taken seriously, it could become one of the most harmful.


Collins Comfort Masters

Here’s 1 way to ensure your family is drinking safe water

Water is maybe one of the most important resources in our lives, and especially if you have kids, you want them to have access to safe water.


Canvas Annuity

Interest rates may have peaked. Should you buy a CD, high-yield savings account, or a fixed annuity?

Interest rates are the highest they’ve been in decades, and it looks like the Fed has paused hikes. This may be the best time to lock in rates for long-term, low-risk financial products like fixed annuities.

Is someone spying on me, even if I use malware scanners?