Expert Comments On State Of Malware Report: Shifted Tactics And Targets As A Result Of The COVID-19

Cybersecurity firm Malwarebytes has released its annual “State of Malware” report, revealing that cyberattackers have shifted tactics and targets as a result of the COVID-19 pandemic. Some of the featured findings are:

  • Significant increase in stalkerware across 2020;
  • 565% increase in tracking applications between January and December last year;
  • 1,055% increase in spyware detection in the same period.

Experts Comments

February 17, 2021
Jake Moore
Cybersecurity Specialist
ESET

Trust is a huge factor, and potential victims may well have allowed their would-be stalker access to their device. Many people have their spouse’s fingerprints on their mobile and do not expect this to be used nefariously. This is just as much a privacy problem as it is a security issue, but I would always advise people to scrutinise what is installed on their devices.

 

Your devices should always be locked, and you should never use simple or easy-to-guess passcode, such as dates of birth or

.....Read More

Trust is a huge factor, and potential victims may well have allowed their would-be stalker access to their device. Many people have their spouse’s fingerprints on their mobile and do not expect this to be used nefariously. This is just as much a privacy problem as it is a security issue, but I would always advise people to scrutinise what is installed on their devices.

 

Your devices should always be locked, and you should never use simple or easy-to-guess passcode, such as dates of birth or anniversaries. Most phones will allow you to check which apps are able to track and log your location, which can be a quick and easy way to monitor for any unknown apps. It's always advisable to check which apps are on your phone and conduct a virus scan where necessary. If there are any apps on your device that you do not recognise it is worth searching online for reviews and deleting them. As a general rule, if you aren't using an app, delete it as it could be modified to change its functionality.

  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.