This symptom may indicate that something has been done to your phone

A Finnish information security expert has given an interview to a British newspaper in which he warns about information security threats related to the end of a relationship.

F-Secure’s cyber intelligence manager Laura Kankaala (right) tells in an interview with a British newspaper what digital measures should be taken in the event of a separation. Adobe Stock / AOP / F-Secure

  • In the event of a separation, data security issues must also be taken into account.
  • A difficult breakup or a hostile ex-partner can increase data security threats.
  • A Finnish expert told the tips in an interview with a British newspaper.

Cyber ​​intelligence manager of the security company F-Secure Laura Kankaala has told the British for the Daily Mailwhat information security risks it is good to be aware of when a relationship ends.

If computers or tablets have been shared during the relationship, the ex-spouse may still have access to the other party’s e-mail, passwords and even bank account even after the divorce.

– It is likely that at some point you have used your partner’s tablet or laptop and forgot to log out, or your password may have inadvertently been saved on the device, says Kankaala.

In the worst case scenario, the ex-partner might even be spied on and their nude photos – either real or stripped down with the help of artificial intelligence – can be shared online.

In the United States, there were as many as three million victims of so-called cyberstalking in 2019. According to a report by the US Department of Justice, almost 70 percent of the victims knew the person who spied on them.

– Stalking and using modern technology, such as artificial intelligence, for harassment can be a serious threat if the digital divide is not managed properly, Kankaala tells the magazine.

Digital procedures in the event of separation

When you break up, check shared devices and log out of e-mail, social media accounts and other services you may have used.

If you have access to, for example, surveillance cameras, remote-controlled lights, camera doorbells, motion detectors or other smart home devices, log your ex-partner’s accounts out of them.

Check that the ex-partner does not have access to locators that remain in your use, such as Apple’s Airtags or similar devices from other manufacturers. Also remove your ex’s access to shared photo libraries on smart devices.

If you’ve used easy-to-guess passwords for services, it’s a good idea to change them too, even if you haven’t shared your password with your ex.

– Your ex-partner might know you well enough to guess your password, so it’s better to play it safe.

The story continues below the video.

This is how you block an unwanted phone number on both Android and iPhone. Elle Laitila

This symptom may indicate spyware

If you have the slightest suspicion that your partner may have installed spyware on your device, it’s worth checking.

– This is one of the most important measures in difficult separations from a hostile partner. That should be checked first, Kankaala emphasizes.

Spy software installed on a phone can be used to track a person’s location in real time, steal call data and message history, and even activate the microphone and camera.

– In Android phones, one sign of spyware can be the device heating up, which is caused by constant positioning, says Kankaala.

He recommends iPhone users to check the devices connected to their iCloud account in the settings and delete all that are not in their own use.

Kankaala recommends going through the applications installed on the phone and examining in more detail those that are not recognized.

Source: Daily Mail

ttn-54