Fact-checked by Grok 2 weeks ago

Stalkerware

Stalkerware is commercial that enables the secret monitoring of an individual's smartphones, tablets, or computers, allowing unauthorized access to data such as GPS location, call logs, text messages, keystrokes, and sometimes camera or feeds without the device's owner's or . Often disguised and marketed as legitimate tools for , anti-theft protection, or employee oversight, these applications are installed via physical device access or remote exploits and transmit collected information to a perpetrator's online dashboard for real-time . The technology's prevalence has surged, with cybersecurity analyses detecting stalkerware on devices used by nearly 31,000 individuals globally in 2023, reflecting a 239% increase over the prior three years amid broader rises in digital monitoring tools. Android devices face higher infection rates than iOS due to platform differences in app restrictions, though both remain vulnerable, particularly in contexts of interpersonal conflicts where such software facilitates persistent tracking. Legally, stalkerware occupies a contentious gray area: while purchasable and ostensibly lawful for consensual uses like family monitoring, its covert deployment typically breaches statutes and anti-stalking laws in numerous countries, prompting regulatory crackdowns such as U.S. orders permanently barring specific developers from operations for deceptive practices and enabling abuse. Enforcement challenges persist, including low victim reporting, resource constraints for investigators, and the software's evasion of standard antivirus detection, compounded by periodic data breaches that ironically expose perpetrators' own activities. These incidents underscore the causal risks of repurposing monitoring tech for non-consensual ends, where empirical detections reveal misuse patterns tied to relational dynamics rather than isolated criminality.

Definition and Scope

Core Definition

Stalkerware is a category of or software designed to monitor and record a person's activities on their without their knowledge or , typically installed by an unauthorized such as an abusive intimate . It operates covertly in the background, evading standard detection by disguising itself as legitimate processes or system files, and transmits collected data to the installer's remote . Unlike consensual monitoring tools, stalkerware emphasizes and persistence, often requiring physical access to the target for initial via methods like apps or exploiting vulnerabilities. Common capabilities include real-time GPS location tracking, logging of incoming and outgoing calls and text messages, interception of app-specific communications (e.g., or ), keystroke capture for passwords and searches, and activation of device cameras or microphones for environmental surveillance. These features enable comprehensive of the victim's movements, interactions, and online behavior, facilitating physical or coercive control in domestic abuse scenarios. Commercially available stalkerware products, such as those marketed under guises like or employee oversight, numbered over 60 distinct apps as of early reports, though many have faced shutdowns due to data breaches exposing user and victim information. The term "" emerged to describe the repurposing of legitimate monitoring software for non-consensual , distinguishing it from broader categories that target financial data or credentials for profit-driven motives. While some vendors claim ethical uses, from cybersecurity analyses shows predominant deployment in , with victims often unaware until battery drain, unusual data usage, or behavioral anomalies prompt investigation. Prevalence data indicate millions of installations globally, underscoring its role as a tool for digital abuse rather than benign oversight. Stalkerware is distinguished from general primarily by its intent and application: while encompasses a broad category of malicious software designed to secretly collect user data for purposes such as advertising, , or corporate espionage, stalkerware specifically targets interpersonal , enabling an abuser or unauthorized party to monitor a victim's personal communications, location, and activities without consent. This focus on domestic or relational control differentiates it, as stalkerware often leverages features like real-time GPS tracking, call recording, and tailored for hidden personal oversight rather than mass data harvesting. In contrast to legitimate software, which is typically installed with transparency on a child's to promote safety—such as limiting or filtering —stalkerware operates covertly on an adult's personal , evading detection and lacking the monitored individual's awareness or agreement. Many stalkerware apps are repurposed or sideloaded versions of parental tools, bypassing vetting to enable stealth modes that hide icons and notifications, a feature absent in ethical monitoring apps bound by platform policies. Similarly, differs from tools, often termed "bossware," which are deployed on devices with disclosed policies for tracking, such as logging keystrokes or screen activity during business hours. These tools operate in a professional context with implied or explicit via employment agreements, whereas invades private life on personal hardware, prioritizing relational dominance over . Overlaps occur when monitoring software is misused for non-consensual purposes, but the defining boundary lies in unauthorized secrecy and non-commercial intent.

Historical Development

Origins in Spyware

Stalkerware originated as a subset of , which encompasses software that covertly monitors user activity and transmits data to unauthorized parties. The term "" first appeared in 1995, referring to programs embedded in to track user behavior for , but by the early , it had evolved into tools capable of , file access, and remote on personal computers. These capabilities provided the technical foundation for stalkerware, as spyware's emphasis on stealth, persistence, and mirrored the requirements for unauthorized personal monitoring. With the proliferation of smartphones around 2007, developers shifted focus to mobile platforms, creating applications that exploited device features like GPS, microphones, and messaging apps. Early commercial mobile monitoring tools, such as those from FlexiSPY, emerged in the mid-2000s, marketed primarily for parental oversight or employee tracking but enabling surreptitious installation via physical access or . These products differed from traditional by being sold openly online, often with subscription models, which facilitated their adaptation for intimate partners through features like real-time location sharing and ambient recording. By design, such evaded basic detection, requiring or jailbreak access on devices to operate undetected, a tactic that persisted into stalkerware variants. The explicit linkage to stalking solidified in the early 2010s, as consumer-grade spyware like mSpy—launched in 2010—gained traction for relational surveillance. mSpy allowed monitoring of calls, texts, emails, and social media without visible icons, appealing to abusers seeking control over partners' communications and movements. Kaspersky researchers observed that stalkerware shares core functionalities with commercial spyware, including hidden operation and data upload to remote servers, but targets non-criminal personal relationships rather than broad espionage. Empirical cases from 2014 documented spyware like mSpy being deployed in domestic abuse, where victims remained unaware of tracking via misleading app labels, highlighting the causal shift from general data theft to targeted interpersonal control. This evolution was driven by market demand for "legitimate" monitoring, which blurred ethical lines and enabled widespread misuse without robust vendor restrictions.

Commercialization and Widespread Adoption (2010s Onward)

The commercialization of stalkerware intensified during the , paralleling the explosive growth in ownership, which exceeded 3.5 billion devices globally by and facilitated the development of sophisticated mobile applications. Companies positioned these tools as solutions for parental oversight, employee tracking, or , often requiring physical for or exploitation of iCloud credentials to bypass security. Key products emerged or expanded in this period, including FlexiSPY, which by the mid-2010s provided features such as ambient recording, GPS location tracking, and interception of communications on rooted or jailbroken and devices, marketed through direct-to-consumer sales with subscription pricing starting at approximately $68 per month. This era saw a proliferation of vendors offering stealth apps that evaded basic detection by hiding icons and running in the background, with sales funneled via independent websites to circumvent app store policies—Google and Apple had begun scrutinizing and removing such software by the late 2010s, though enforcement remained inconsistent until 2020. Adoption metrics, derived from security vendor telemetry, reflect rising prevalence: Kaspersky detected stalkerware impacting 27,000 unique users worldwide in 2018, increasing 11% to 30,000 in 2019, with installation attempts blocked numbering over 42,000 annually by then. These figures, while underrepresenting total use due to undetected instances, indicate consumer-level uptake driven by accessible pricing and perceived utility in personal contexts, despite ethical and legal concerns over non-consensual deployment. Into the early , adoption continued to broaden amid platform updates that both hindered and adapted to evasion techniques, such as no-root installations. A 2020 NortonLifeLock survey found 10% of U.S. respondents admitting to using stalkerware for tracking partners or ex-partners, underscoring domestic misuse. Detections surged further, with Kaspersky reporting 29,312 affected users in 2022 alone, averaging over 3,300 new cases monthly, exacerbated by pandemic-related isolation that amplified intimate partner by 83% in some regions. Regulatory responses lagged commercialization, with platforms like formally banning stalkerware apps from the Play Store in 2020 and restricting related , yet direct sales persisted, highlighting the challenge of curbing a oriented toward individual buyers rather than institutional oversight. During the in 2020, stalkerware detections showed varied patterns across vendors, with Kaspersky reporting 53,870 global mobile users affected, a decline from 67,500 in 2019, potentially due to shifts toward other methods amid increased and device sharing restrictions. However, observed a 51% rise in and stalkerware usage in the since March 2020, attributing it to lockdowns enabling abusers greater physical access to victims' devices for installation. This surge aligned with broader reports of technology-facilitated abuse, including a 55.2% increase in stalkerware detections since the pandemic's onset, as quarantines heightened domestic tensions and monitoring opportunities. From 2020 to 2023, the global prevalence of stalkerware escalated significantly, with documenting a 239% increase in affected users, rising from an average of 18 per 100,000 people in 2020 to higher rates by 2023, driven by commercial availability and ease of deployment on devices. Kaspersky's 2023 analysis confirmed ongoing threats, detecting nearly 31,000 mobile users worldwide subjected to stalkerware, with platforms disproportionately impacted due to sideloading vulnerabilities compared to restrictions. Detection trends in reflected this growth, including a 4.2% year-over-year rise in monitor software and 7.2% in , underscoring persistent deployment despite awareness campaigns. Regulatory responses intensified mid-period, exemplified by the US Federal Trade Commission's 2021 ban on SpyFone, a stalkerware provider, prohibiting its business and mandating deletion of illicitly collected data to curb deceptive marketing and privacy violations. By 2025, at least 26 stalkerware vendors since 2017 had suffered data breaches or leaks, exposing user and information and amplifying risks for installers, as highlighted in analyses urging abandonment of such tools due to inherent insecurity. Projections for 2025 estimate around 19,226 affected users globally, suggesting a potential decline from peak years, possibly from improved features and education efforts by coalitions like the Coalition Against Stalkerware, though underreporting remains a challenge given the software's covert nature.

Technical Functionality

Key Features and Capabilities

Stalkerware encompasses a variety of covert monitoring tools that enable comprehensive of a target's digital activities and physical location, often running in to evade detection. These applications typically require physical access to the device for initial installation and exploit permissions to access core functions like GPS, communications, and sensors, transmitting collected data to a remote or companion app for the controller's review. Key capabilities include real-time GPS tracking, which logs the device's location and historical movements with precision down to street-level accuracy in supported areas. Call and SMS logging captures incoming/outgoing phone logs, text messages, and in some cases audio recordings of conversations. records all typed inputs, including passwords, search queries, and messages, facilitating the interception of sensitive . Additional functions extend to media access, retrieving photos, videos, and voice memos stored on the device; history monitoring, which tracks visited websites and search terms; and app usage analytics, detailing installed applications and interaction patterns. surveillance scans activity on platforms such as and , while remote activation of the microphone and camera allows live audio/video feeds or environmental recording without user notification. Some variants support screenshot capture at intervals or on triggers, and interception for full content. These features are more readily implemented on devices due to their , whereas iOS variants often necessitate jailbreaking to bypass restrictions, limiting prevalence on Apple platforms. occurs over connections, with alerts configurable for specific events like location changes or incoming calls, enhancing the tool's utility for persistent monitoring.

Installation and Evasion Techniques

Stalkerware installation typically requires physical access to the target device, allowing the installer to download and deploy the software directly. On devices, this often involves apps from third-party sources or official stores, disguised as legitimate tools such as or anti-theft applications. For devices, installation necessitates jailbreaking the phone first, a process that demands physical possession and technical knowledge to bypass Apple's security restrictions. In some cases, abusers pre-install stalkerware on devices gifted to victims, enabling monitoring without subsequent access. Once installed, stalkerware employs several techniques to evade user detection and traditional security measures. It operates silently in the , concealing its app icon and excluding itself from the device's list of installed applications to avoid . Many variants notify the controlling party via alerts if the software is detected or removed, potentially erasing traces to hinder forensic analysis. While designed for , indirect indicators such as accelerated battery drain, elevated data usage, or unexplained changes in device settings may emerge due to continuous of location, calls, messages, and keystrokes. Advanced evasion includes mimicking benign system processes or leveraging permissions granted during to blend with normal , thereby eluding basic antivirus scans that rely on signature-based detection. On rooted or jailbroken devices, deeper allows of system calls or hiding within kernel-level components, though such methods increase and risk of device instability. platforms see higher prevalence of these apps compared to , with over 31,000 unique users affected globally in 2023 per Kaspersky .

Detection, Removal, and Mitigation

Detecting often involves monitoring device anomalies such as rapid depletion, elevated consumption, or unfamiliar applications, which may indicate covert software running in the . Antivirus solutions like Kaspersky and have demonstrated effectiveness in identifying , with independent tests showing high detection rates for known variants on and Windows devices. For users, enabling Protect and reviewing installed apps via settings can reveal suspicious permissions or hidden processes; on , checking for unauthorized (MDM) profiles in Settings > General > VPN & Device Management is essential, as frequently exploits these for persistence. Specialized tools, such as the WARNE developed for forensic analysis, assist investigators in semi-automated collection from devices in cases, though they require technical expertise. Removal typically begins with a full antivirus scan using reputable software like or Kaspersky, which can and delete detected without alerting the installer if configured stealthily. On , users should uninstall suspect apps through Settings > Apps, revoke administrator privileges, and perform a as a last resort to erase persistent threats, though this wipes all data and necessitates backups from trusted sources. For , removing MDM profiles or certificates via Settings resolves many infections, but jailbroken devices may require restoring to factory settings or acquiring a new device if the stalkerware has root . In severe cases, particularly where physical by the abuser persists, replacing the device entirely is recommended to ensure complete eradication, as some stalkerware evades standard scans by mimicking legitimate apps or using techniques. Effectiveness varies; while top antivirus programs detect over 90% of tested stalkerware samples, zero-day variants may require manual intervention or professional forensic services. Mitigation strategies emphasize proactive cybersecurity hygiene to prevent installation, including using strong biometric or PIN locks to block unauthorized physical access, routinely updating operating systems and apps to patch vulnerabilities exploited by stalkerware, and limiting app permissions to essential functions only. Installing endpoint detection tools with real-time monitoring, such as those from Kaspersky, reduces reinfection risks by alerting to anomalous behavior post-removal. Users should avoid sideloading apps from unverified sources and enable features like Android's unknown sources restrictions or iOS's app review prompts. In high-risk scenarios, such as ongoing abusive relationships, combining technical measures with behavioral changes—like not leaving devices unattended—and seeking support from organizations providing secure device donation programs enhances long-term protection. Empirical data from cybersecurity firms indicates that consistent application of these practices correlates with lower incidence of repeated stalkerware deployments.

Applications and Motivations

Legitimate Monitoring Contexts

Parental monitoring of minors' devices represents a primary legitimate context for deploying monitoring software akin to technologies. Parents or legal guardians may install such tools on devices they own or provide to children under 18 to safeguard against online risks, including exposure to inappropriate content, , or predatory interactions. Features typically include web filtering to block explicit sites, limits to prevent excessive usage, and geolocation tracking for ensuring physical during outings. For instance, applications like Qustodio enable detailed logs of app usage and history while allowing customizable restrictions, marketed explicitly for family . These tools are distinguished from by their emphasis on transparency—often displaying icons or notifications on the device—and the framework for minors, where parental authority supersedes full autonomy. In jurisdictions like the , such monitoring is generally permissible on family-owned devices without violating laws, provided it does not extend to intercepting communications involving third parties without consent. Employee monitoring on corporate-owned hardware constitutes another established legitimate application, focused on protecting business assets, ensuring , and maintaining . Employers deploy software to track usage of company-issued smartphones, laptops, or tablets, for data exfiltration, unauthorized access to sensitive information, or non-work-related activities during paid hours. Tools such as those integrated with or similar endpoint management systems log application activity, keystrokes, and network traffic, often with policies requiring employee acknowledgment via acceptable use agreements. This practice is legally supported in many countries under contracts that stipulate ownership and rights, as long as it adheres to data protection regulations like the EU's GDPR, which mandates and . Unlike stalkerware, these systems prioritize disclosed oversight—employees are typically informed at —and serve organizational security rather than personal intrusion, with limited to business needs. In both contexts, legitimacy hinges on , (explicit for adults, custodial for minors), and protective intent rather than covert . For vulnerable adults, such as elderly dependents with cognitive impairments, guardians may employ similar software under legal authority like , though this requires documented justification to avoid overreach. Empirical distinctions emphasize that legitimate tools avoid full-spectrum stealth modes designed for evasion, instead integrating user-facing controls to foster . However, blurred lines emerge when extends to shared devices without clear boundaries, underscoring the need for jurisdictional specificity in application.

Abusive and Criminal Exploitation

Stalkerware is predominantly exploited in contexts of and , where perpetrators install it surreptitiously on ' devices to enable continuous and control. Abusers leverage features such as real-time GPS tracking, access to text messages, call logs, and to monitor victims' movements, communications, and online activities, often preventing escape or help-seeking behaviors. Kaspersky Laboratory's analysis detected stalkerware on 53,870 mobile devices worldwide in 2020, with usage surging 83% during amid elevated reports, including a 30% rise in and increases across . By 2023, the figure stood at nearly 31,000 affected users globally, highlighting persistent deployment primarily against women in abusive relationships. Such exploitation intensifies harm by correlating with physical violence escalation; victims report heightened isolation, as abusers use harvested data for , threats, or coordinated attacks. For example, apps like those from Retina-X Studios enabled reading of messages, viewing of photos and videos, and call monitoring, directly facilitating abuse until regulatory intervention. In one documented case, a perpetrator tracked a spouse's location via built-in features akin to stalkerware, leading to and charges. Criminally, violates , , and anti-stalking laws, with prosecutions treating unauthorized installation as felony harassment or invasion of privacy. In the United States, the fined stalkerware developer Retina-X $410,000 in February 2023 for deceptive marketing that obscured abusive risks, mandating notifications to over 4,000 affected customers and victims. Enforcement challenges persist due to jurisdictional variances and evasion tactics, but cases like City's 2019 initiative to deploy ethical hackers against abuser-installed demonstrate targeted countermeasures. Beyond domestic contexts, rare instances involve non-intimate criminal rings using stalkerware for or , though empirical data remains limited compared to interpersonal abuse patterns.

Prevalence and Empirical Data

Global Usage Statistics

In 2023, Kaspersky Security Network detected stalkerware affecting 31,031 unique users worldwide, marking a 5.8% increase from 29,312 users in 2022. These figures represent confirmed detections via antivirus scans, likely underestimating total prevalence due to undetected installations and users without security software. Detections spanned 175 countries, with devices comprising over 99% of cases, reflecting iOS's stronger app sandboxing and review processes.
YearUnique Users Affected (Kaspersky Data)
202132,700
202229,312
202331,031
Geographically, led with 9,890 affected users in 2023, followed by (4,186) and (2,492), accounting for roughly half of global detections. Among stalkerware apps, TrackView impacted 4,049 users globally, while Reptilic and SpyPhone affected 3,089 and 2,126 users, respectively. Separate telemetry from indicated a 239% rise in the global risk of stalkerware encounters on devices from 2020 to 2023, driven by availability and ease of . No comprehensive 2024 or 2025 data has been publicly released as of October 2025, though ongoing detections suggest sustained or increasing trends amid limited regulatory enforcement.

Patterns of Deployment and Victim Demographics

Stalkerware is most commonly deployed by current or former intimate partners seeking to exert in abusive relationships, often requiring physical access to the target's for initial installation, after which remote ensues via dashboards or linked accounts. Perpetrators frequently disguise the software as legitimate applications like or anti-theft tools to evade detection, with installation occurring opportunistically when the leaves their device unattended. In 2023, Kaspersky detected stalkerware on devices of 31,031 unique users worldwide, reflecting a pattern concentrated in regions with high rates, such as (9,890 cases), (4,186), and (2,492). While some deployments occur in non-abusive contexts like parental , abusive uses predominate in reported detections, aligning with (IPV) dynamics where 13% of surveyed individuals reported partner-initiated . Victim demographics skew toward women in or post- relationships, consistent with broader IPV patterns where technology-facilitated amplifies tactics. Surveys indicate that 42% of respondents experienced or compared to 36% of males, with women expressing higher concern (36% vs. 31%) about online risks. Perpetrator admissions further support this: 10% of males versus 8% of females reported installing stalkerware on a 's device, implying a disproportionate victimization rate. Age data is limited, but digital demands and monitoring are more prevalent among those aged 18-34 (53% likelihood of experiencing such intrusions) than older groups (8% for 55+). Approximately 7% of global respondents in 2023 reported unaware stalkerware installation, often in long-term relationships (62% of cases) or recent scenarios (23%), underscoring under-detection as remain ignorant of . Empirical challenges persist due to ' unawareness and underreporting, but detections correlate with IPV hotspots rather than random or .

Jurisdictional Variations

In the United States, stalkerware installation without consent typically violates federal statutes such as the Computer Fraud and Abuse Act (18 U.S.C. § 1030) and the Electronic Communications Privacy Act's Wiretap provisions (18 U.S.C. § 2510 et seq.), which prohibit unauthorized access to devices and interception of communications, though enforcement relies heavily on proving intent to harass or stalk. State laws further diverge: for instance, California and New York have explicit cyberstalking statutes (Cal. Penal Code § 646.9; N.Y. Penal Law § 120.45) that encompass spyware deployment, with penalties up to five years imprisonment, while other states like Texas address it under broader harassment codes without dedicated spyware bans, leading to lighter misdemeanor charges for first offenses. The Federal Trade Commission has intervened against providers, as in its 2021 final order banning Retina-X Studios and its CEO from the surveillance business for deceptive practices enabling abuse, highlighting regulatory focus on commercial deception rather than outright prohibition. In the , the General Data Protection Regulation (GDPR, Regulation (EU) 2016/679) provides a framework to challenge stalkerware by mandating consent for , allowing fines up to 4% of global turnover for non-compliant apps that secretly collect , messages, or keystrokes; groups have successfully invoked it to pressure providers into delisting invasive tools. However, member states vary in implementation: Germany's has ruled unauthorized device monitoring unconstitutional under (Art. 10 GG), while the EU's 2022 proposal on combating explicitly includes via stalkerware, aiming for harmonized with minimum penalties of 1-5 years , though adoption remains pending as of 2023. Australia's approach emphasizes stalking offenses under state laws, with amending its in 2024 to classify tracking via smart devices or apps as (Crimes Act 1900 (NSW) s 13), punishable by up to 5 years , reflecting a response to rising domestic cases. Federally, the 2004 (Cth) prohibits unauthorized tracking devices, but gaps persist in regulating software-based stalkerware, prompting a 2022 national program for victim support and detection rather than comprehensive bans. Queensland's 2020 review identified uncertainties in prohibitions, leading to calls for tighter penalties amid evidence of family violence perpetrators exploiting legal loopholes. Internationally, most jurisdictions lack specific stalkerware bans, deferring to general or laws; for example, Canada's (s 264.3) criminalizes unauthorized interception with up to 5 years penalties, while countries like and rely on IT Acts punishing without explicit provisions, resulting in inconsistent enforcement. In contrast, some nations permit limited use for parental or employer monitoring with disclosure, but abusive deployment triggers sanctions under anti-stalking statutes, as notes in its 2021 global framework urging collective action against cross-border proliferation. Overall, commercial availability persists in gray areas, with Kaspersky reporting in 2023 that stalkerware remains unregulated in the majority of countries, complicating victim recourse.

Enforcement and Challenges

Enforcement against primarily involves regulatory actions by agencies rather than widespread criminal prosecutions. In the United States, the () has pursued cases under laws prohibiting unfair and deceptive practices, such as the 2019 action against developers of three stalking apps, which resulted in bans on businesses and requirements for enhanced disclosures. Similarly, the finalized an order in 2021 banning a provider and its CEO from the spyware industry after allegations of unauthorized monitoring. State-level enforcement includes the New York Attorney General's 2023 settlement imposing a $410,000 fine on Patrick Hinchy and associated companies for producing and selling , compelling victim notifications. Criminal prosecutions remain rare; federal cases, which may encompass stalkerware use, peaked at 80 filings in 2019 but totaled only 412 from 2010 to 2020, with a 90% on primary charges where pursued. Key challenges in enforcement stem from technical and operational hurdles. and victim services often lack specialized tools and training to detect stalkerware and collect , as these programs employ evasion techniques like code obfuscation and dynamic naming, rendering antivirus detection rates as low as 31-47%. Evidentiary issues are compounded by difficulties in linking digital traces—such as encrypted data or device logs—to perpetrators, particularly when stalkerware is installed surreptitiously or via dual-use apps marketed for legitimate monitoring. Underreporting persists due to fears of retaliation (noted in 67% of cases), low awareness of stalkerware's role in , and mistrust of police, further exacerbated by limited jurisdictional resources and prioritization of relative to other crimes. Internationally, enforcement lags due to fragmented regulations and cross-border deployment challenges, with efforts largely confined to awareness initiatives like the Coalition Against Stalkerware, supported by since 2021, rather than coordinated prosecutions. Scant data on global convictions highlights systemic gaps, including inconsistent policies and the persistence of stalkerware in high-prevalence regions like , , and . Addressing these requires enhanced collaboration among security researchers, developers, and authorities to improve detection and evidentiary standards.

Controversies and Debates

Privacy and Ethical Critiques

Stalkerware facilitates the unauthorized of an individual's digital activities, including communications, , and app usage, thereby constituting a direct infringement on personal . This monitoring often occurs without the target's or , enabling perpetrators to access intimate details of private life that would otherwise remain protected. advocates argue that such tools undermine the foundational principle of informational , where individuals control their own , leading to a on free expression and personal autonomy in digital spaces. Ethically, the deployment of stalkerware raises profound concerns over and relational , as typically bypasses device security and user awareness, transforming personal devices into instruments of covert control. Critics, including cybersecurity firms, contend that even applications marketed for familial foster unethical power imbalances, particularly in intimate partnerships, where can perpetuate cycles of abuse rather than prevent harm. The has highlighted these issues by banning providers for deceptive practices that exploit vulnerabilities in relationships, emphasizing that non-consensual tracking erodes moral boundaries between protection and predation. Furthermore, ethical critiques extend to the broader societal normalization of technologies, where the availability of blurs lines between legitimate oversight and invasive spying, potentially desensitizing users to erosions. Reports from 2023 indicate that detections affected nearly 31,000 users globally, underscoring how these tools enable sustained violations that disproportionately vulnerable groups, such as victims of . While proponents may invoke first-principles arguments for parental or spousal vigilance, detractors counter that true ethical monitoring requires and , absent in 's design.

Security Risks and Data Breaches

Stalkerware applications, by design, collect extensive sensitive data including location histories, call logs, messages, and keystrokes from monitored devices, rendering any security lapses highly consequential for both victims and deployers. These apps often operate with elevated privileges to evade detection, which paradoxically exposes them to by third parties, as developers prioritize over robust or access controls. Empirical analyses reveal systemic vulnerabilities, such as unpatched servers and weak , stemming from the opaque, profit-driven nature of the industry, where many providers lack rigorous cybersecurity standards. Data breaches have repeatedly compromised user and victim information, with at least 26 stalkerware providers affected since 2017, often resulting in leaked credentials, device identifiers, and logs sold on markets. In May 2015, —a prominent tool—suffered a exposing from approximately 400,000 customers, including emails and payment details, after hackers accessed backend systems via . Another incident in July 2024 leaked sensitive information on millions of users, highlighting persistent deficiencies despite prior warnings. FlexiSPY faced a 2017 hack by a group called , who exploited basic misconfigurations to access customer dashboards and , underscoring how easily these tools' infrastructures can be compromised. Recent events amplify these risks: In March 2025, SpyX's breach exposed victim surveillance data, contributing to a pattern where apps like Spyzie, Cocospy, and Spyic leaked millions of records in February 2025 due to exploitable flaws. By May 2025, multiple apps shut down abruptly following similar vulnerabilities that allowed unauthorized access to victim data, demonstrating the causal link between inadequate security and operational failures. pcTattletale's 2024 hack further illustrated this, with potential exposure of screenshots and webcam captures from victims' devices. Such incidents not only undermine the apps' intended secrecy but also heighten risks of , , and further , as breached data enables malicious actors to impersonate or target individuals.
AppBreach DateImpact DetailsSource
mSpyMay 2015400,000+ customer emails, payments exposed via
FlexiSPYCustomer dashboards, accessed via misconfigurations
mSpyJuly 2024Millions of users' sensitive data stolen
SpyXMarch 2025Victim surveillance data leaked
Spyzie et al.Feb 2025Millions of records from multiple apps exposed

Balancing Protection Versus Intrusion

Proponents of monitoring software argue that it enables legitimate protective functions, particularly for parents overseeing minors' activities to prevent to predators, , or explicit content, where legal authority grants broad discretion over children's devices. , for instance, parents retain significant rights to family-owned devices without violating expectations, as minors lack the same as adults, supporting the view that such tools fulfill a safeguarding role rather than mere intrusion. Similarly, employers may deploy on company-provided to enhance , prevent leaks, and ensure , with and state laws permitting such practices provided employees are notified and no unreasonable personal occurs. These applications often include transparent features like activity logs or alerts, distinguishing them from covert operations when used as intended. Critics contend that the technical overlap between protective tools and stalkerware—such as hidden installation options and comprehensive capture—erodes boundaries, even in ostensibly justified scenarios, by fostering a culture of pervasive that undermines trust and autonomy. Empirical from cybersecurity analyses reveal that many apps marketed for parental or employee use suffer from inherent vulnerabilities, including leaks exposing monitored individuals' , which amplifies risks beyond intended and can enable unauthorized by third parties. For children, excessive monitoring correlates with reduced digital independence and heightened problematic media use, as restrictive oversight may stifle resilience-building rather than bolstering , according to studies on adolescent habits. In employment contexts, undisclosed or overly invasive tracking has prompted legal challenges under torts, illustrating how protective rationales can mask disproportionate intrusion when is ambiguous or absent. The tension arises from stalkerware's design, which prioritizes over safeguards, allowing protective intents to devolve into ; reports indicate that while legitimate deployments exist, a substantial share of detected cases—over 30,000 globally in —involve non-consensual partner tracking rather than verified child or workplace protection, underscoring the causal pathway from to harms. Balancing requires explicit mechanisms, jurisdictional limits on , and to segregate features, as covert capabilities inherently tilt toward intrusion by circumventing user awareness and recourse. Without such delineations, the protective value diminishes against the backdrop of empirical misuse patterns and flaws inherent to the software .

Societal and Cultural Implications

Impacts on Individuals and Relationships

Stalkerware deployment causes severe psychological distress in targeted individuals, including heightened anxiety, , pervasive of constant monitoring, and in some cases . Victims frequently report a sense of helplessness and loss of , compounded by effects where abusers manipulate device to undermine the target's . These effects stem from the covert nature of , which erodes personal agency and fosters . Within relationships, stalkerware reinforces dynamics of coercive control, particularly in cases of , by allowing perpetrators to secretly access messages, location data, and app usage to isolate and dictate behaviors. This often intersects with offline abuse, with 34% of in one global survey experiencing physical or verbal alongside stalkerware installation. Among female of involving such tools, 70% also faced physical or sexualized from partners, illustrating how digital intrusion amplifies relational harm. Attempts to detect or remove stalkerware heighten risks, as many applications notify abusers of uninstallation efforts, potentially escalating to threats or physical confrontation. Overall, these impacts hinder ' capacity for and , perpetuating through fear of traceable footprints.

Broader Effects on Privacy Norms and Technology Policy

The proliferation of has catalyzed regulatory scrutiny and enforcement actions aimed at curbing unauthorized , exemplified by the U.S. Federal Trade Commission's () 2021 with SpyFone, which banned the company and its CEO from the business and mandated deletion of unlawfully collected data from over 65,000 devices. This case underscored the FTC's invocation of Section 5 of the FTC Act to address unfair and deceptive practices in distribution, setting a for holding vendors accountable for facilitating non-consensual monitoring without adequate disclosures. Subsequent FTC efforts, including a 2025 coalition pushback against attempts to modify the SpyFone , highlight ongoing tensions in enforcing such bans amid vendor resistance. Legislative initiatives have emerged to address stalkerware's role in technology-facilitated abuse, such as the U.S. House's introduction of H.R. 6173 in 2023, the Tech Safety for Victims of , , , and Act, which seeks to enhance tech industry obligations for removing harmful surveillance tools and supporting victim data access. Policy analyses advocate adapting data protection frameworks, drawing on models like the EU's (GDPR), to impose strict requirements on stalkerware providers, potentially classifying non-consensual installations as violations of processing principles. These efforts reflect a causal link between stalkerware's empirical prevalence—evidenced by detections on millions of devices—and demands for federal privacy legislation that prioritizes device-level safeguards over voluntary industry self-regulation. On privacy norms, stalkerware deployments have eroded in mobile ecosystems, prompting shifts toward default and tamper-evident features in operating systems, as abusers often exploit physical access to bypass software protections. Industry responses include Google's 2020 policy to delist ads for intimate partner apps from its , reducing visibility for tools marketed ambiguously as "" software, though enforcement gaps persist due to tactics. This has fostered broader normative expectations for in permissions and vendor , with coalitions like the Coalition Against Stalkerware advocating for ethical design principles that distinguish legitimate from covert abuse tools. However, challenges arise from legal ambiguities, as U.S. wiretap laws permit in shared devices under certain conditions, complicating uniform standards. Technology policy debates intensified by emphasize reconciling for security (e.g., anti-spyware prohibitions for use issued in ) with individual autonomy, revealing enforcement hurdles where apps evade reviews via or false labeling as employee trackers. Data es in stalkerware services, such as those exposing millions of users in early 2025, further underscore the need for mandatory and to mitigate cross-border data flows in abusive contexts. Overall, these developments have advanced a policy paradigm prioritizing verifiable consent and empirical over permissive monitoring markets, though systemic underreporting and jurisdictional variances limit comprehensive reform.

References

  1. [1]
    What is Stalkerware? - Kaspersky
    How is Stalkerware Installed? Stalkerware software and apps are commercially available online and can easily be downloaded and installed. The “stalker” simply ...Missing: prevalence statistics
  2. [2]
    Kaspersky 2023 report on stalkerware - Securelist
    Mar 13, 2024 · Stalkerware products are typically marketed as legitimate anti-theft or parental control apps for smartphones, tablets and computers, ...Missing: reputable | Show results with:reputable
  3. [3]
    Global Kaspersky report reveals digital violence has increased
    Mar 13, 2024 · The latest Kaspersky State of Stalkerware 2023 report reveals almost 31000 mobile users worldwide were subjected to stalkerware, ...
  4. [4]
    Stalkerware Grows 239% Worldwide Over the Past Three Years
    Mar 14, 2023 · The risk of encountering stalkerware on a mobile device increased 239% globally over a three-year period according to the latest threat ...Missing: prevalence statistics
  5. [5]
    FTC Finalizes Order Banning Stalkerware Provider from Spyware ...
    Dec 21, 2021 · The Federal Trade Commission has finalized an order banning a stalkerware provider and its CEO from the surveillance business to settle ...Missing: controversies | Show results with:controversies
  6. [6]
    FTC Brings First Case Against Developers of “Stalking” Apps
    Oct 22, 2019 · The Federal Trade Commission has barred the developers of three “stalking” apps from selling apps that monitor consumers' mobile devices unless they take ...Missing: stalkerware | Show results with:stalkerware
  7. [7]
    Stalkerware's legal enforcement problem | Malwarebytes Labs
    Nov 18, 2019 · To blame is a frustrating yet human struggle that includes low awareness, police mistrust, limited law enforcement resources, scant data, furtive advertising ...Missing: controversies | Show results with:controversies
  8. [8]
    Millions of stalkerware users exposed again | Malwarebytes
    Feb 28, 2025 · By definition, stalkerware is a term used to describe the tools—software programs and mobile apps—that enable someone to secretly spy on ...Missing: reputable | Show results with:reputable
  9. [9]
    What is Stalkerware and What Can You Do to Stay Safe? - Bitdefender
    Aug 5, 2025 · Stalkerware is a type of surveillance software that lets someone secretly monitor another person's smartphone or computer activity without ...
  10. [10]
    What to Know About Stalkerware - National Cybersecurity Alliance
    Dec 22, 2023 · Stalkerware, which is sometimes called spyware, refers to a type of app or software that is designed to be hidden from the owner of a device. As ...Missing: definition reputable
  11. [11]
    Stalkerware: What To Know | Consumer Advice
    Do you think an abusive partner or ex is monitoring you through your phone? They might be using stalkerware to secretly track your device activity.Missing: cybersecurity | Show results with:cybersecurity
  12. [12]
    How to find and remove Stalkerware - Malwarebytes
    'Stalkerware' as tools – software programs, apps and devices – that enable someone to secretly spy on another person's private life via their mobile device.Missing: definition | Show results with:definition
  13. [13]
    Spyware vs. Stalkerware: What's the difference? - Laptop Mag
    Jul 11, 2022 · Spyware and stalkerware are both types of malware that are used to track a person's activity on a device. However, stalkerware is considered a more personal ...
  14. [14]
    Stalkerware vs Spyware - Clario Anti Spy
    Mar 14, 2025 · Stalkerware is software that allows someone to track what you're doing on a device. It's usually installed by someone with access to your phone, tablet, or ...
  15. [15]
    Parental monitoring apps: How do they differ from stalkerware?
    Jul 22, 2019 · What are the differences between stalkerware apps and parental monitoring apps? What is an “acceptable” or “safe” parental monitoring app?
  16. [16]
    Spot and Remove Hidden Spy Apps on Your Child's Devices - ESET
    Oct 2, 2025 · The difference between parental control apps and stalkerware lies in purpose, transparency, and consent. Parental apps are meant to protect ...
  17. [17]
    Stalkerware alert: the danger of sideloaded parental monitoring apps
    May 26, 2025 · Sideloaded parental control apps differ from those in the Google Play or Apple App Store because they are not bound by protective regulatory and vetting ...Missing: software | Show results with:software
  18. [18]
  19. [19]
    Inside the Invasive, Secretive “Bossware” Tracking Workers
    Jun 30, 2020 · Invisible monitoring​​ At a technical level, these products are indistinguishable from stalkerware. In fact, some companies require employers to ...
  20. [20]
    Every Move You Make: When Monitoring Employees Gives Rise to ...
    Advanced modern employee monitoring tools have been nicknamed “tattleware” and “bossware” and even likened to “stalkerware.” They allow employers to engage in ...
  21. [21]
    Stalkerware 101: Everything you need to know - Immersive Labs
    Jul 13, 2021 · Stalkerware is subtly different in that it exhibits all the same behaviors as malware, but is sold commercially and pitched as “remote monitoring” that lets ...Missing: definition reputable
  22. [22]
    Stalkers using surveillance software on partners are exposing their ...
    May 18, 2021 · Stalkerware, which is frequently advertised as benign parental controls or employee monitoring software, can surveil targets' geolocation, ...
  23. [23]
    What is Spyware? | HPE Juniper Networking US
    A Brief History of Spyware. The first use of the term “spyware” appeared was in 1995 in a Usenet article that targeted Microsoft's business model. In early 2000 ...
  24. [24]
    Evolution of Spyware and Its Expanding Risks - Hunter Strategy
    Sep 5, 2025 · Spyware first emerged in the late 1990s and early 2000s when simple programs were discovered quietly monitoring user activity without consent.
  25. [25]
    FlexiSPY™ Unique Monitoring Software For Mobiles & Computers
    FlexiSPY is the only monitoring software for Mobile, PC and Mac offering Call Interception, Ambient Listening, Phone Call and VoIP Recording as well as all ...Android Spy App · iPhone spy app · Why Flexispy? · About FlexiSPY
  26. [26]
    Mobile stalkerware: a long history of detection | Malwarebytes Labs
    Jun 24, 2019 · Going back more than five years, Malwarebytes researchers have detected applications and software that monitor other people's online behavior and physical ...
  27. [27]
    mSpy - 2025 Company Profile, Team & Competitors - Tracxn
    Sep 7, 2025 · mSpy is an unfunded company based in Prague (Czech Republic), founded in 2010 by Andrei Shimanovich. It operates as a Cloud-based parental control solutions ...Missing: history | Show results with:history
  28. [28]
    Beware of stalkerware - Securelist
    Apr 3, 2019 · Another trait of many stalkerware services is their unknown origins. In the majority of cases, these are far from transparent, to say the least.
  29. [29]
    Smartphones Are Used To Stalk, Control Domestic Abuse Victims
    Sep 15, 2014 · Cyberstalking victims often don't know they're being tracked through their own phone because spyware apps like mSpy use misleading labels.Missing: timeline | Show results with:timeline
  30. [30]
    Stalking Stalkerware: A Deep Dive Into FlexiSPY - Juniper Blogs
    Dec 20, 2019 · FlexiSPY is designed to be installed secretively. On iPhones and Android devices, FlexiSPY specifies that the device should be jailbroken or rooted.
  31. [31]
    Inside the 'Stalkerware' Surveillance Market, Where Ordinary People ...
    Apr 18, 2017 · This business of spying on spouses is part of the reason the two hackers decided to target FlexiSpy and Retina-X. But the tens of thousands ...
  32. [32]
    The state of stalkerware in 2020 - Securelist
    Feb 26, 2021 · This report continues to examine the issue of stalkerware and presents new statistics from 2020, in comparison to our previous data.Missing: commercial timeline
  33. [33]
    1 in 10 Americans uses stalkerware to track partners and exes, poll ...
    Feb 12, 2020 · Stalkerware can track locations, calls and texts. One in 10 Americans said they use it, according to a poll from NortonLifeLock.
  34. [34]
    The state of stalkerware in 2022 - Securelist
    Mar 8, 2023 · In 2022, Kaspersky data shows that 29312 unique individuals around the world were affected by stalkerware. We detected 182 different ...
  35. [35]
    Inside the fight to rid the world of abusive stalkerware - WIRED
    Oct 29, 2020 · It's mostly covered by the Computer Misuse Act, now 30 years old, or the Protection from Harassment Act of 1997.Missing: controversies | Show results with:controversies
  36. [36]
    51% increase in the use of online spying and stalking apps during ...
    Jul 8, 2020 · In the US, since March, Avast has protected over 3,500 users from apps capable of spying, mostly stalkerware, with the monthly average up 62% vs ...
  37. [37]
    Coalition Members publish major reports on the state of stalkerware ...
    Apr 8, 2021 · Avast Threat Labs found a 55.2% increase in stalkerware since the start of the Covid-19 pandemic. · Kaspersky's data showed in total, 53,870 of ...
  38. [38]
    Stalkerware has grown by 239% worldwide over the past three years
    Mar 14, 2023 · And here's the kicker: Across the globe, the risk of encountering stalkerware on a mobile device has increased by 239% globally over a three- ...
  39. [39]
    Stalkerware Detection Trends: Monitor and Spyware Findings
    Apr 19, 2022 · This represents a 4.2 percent increase in monitor detections and a 7.2 percent increase in spyware detections year-on-year, making 2021 even ...
  40. [40]
    Hacked, leaked, exposed: Why you should never use stalkerware ...
    Jul 2, 2025 · There have been at least 26 stalkerware companies since 2017 that are known to have been hacked, or leaked customer and victims' data online.Missing: detections | Show results with:detections
  41. [41]
    Stalkerware App Statistics: 19,226 Users Could Be Affected in 2025
    Mar 7, 2025 · Based on VPNRanks' analysis, the predicted number of users affected by stalkerware apps in 2025 could be approximately 19,226. This decline ...
  42. [42]
    The Predator in Your Pocket: A Multidisciplinary Assessment of the ...
    Jun 12, 2019 · Spyware has a wide range of capabilities, including pervasive monitoring of text and chat messages, recording phone logs, tracking social media ...<|control11|><|separator|>
  43. [43]
    What Is Stalkerware? - CTI Technology
    Unlike many spyware threats, stalkerware is sometimes marketed as parental control or employee monitoring tools, but its use can be illegal without proper ...
  44. [44]
    Stalkerware Test 2020 released - AV-Comparatives
    Jun 11, 2020 · To find out which antivirus programs were most effective at detecting stalkerware, visit AV-Comparatives' website. Like all the lab's ...
  45. [45]
    What Is Stalkerware? How to Detect & Remove It in 2025
    Rating 10/10 (15) May 8, 2024 · Thankfully, top antiviruses like Norton 360 are effective at detecting and removing stalkerware. Norton consistently achieved excellent results ...
  46. [46]
    Your Android phone could have stalkerware — here's how to remove it
    Feb 20, 2025 · This guide can help you identify and remove common surveillance apps from your Android phone, including TheTruthSpy, Cocospy and Spyic, among others.
  47. [47]
    How to find and remove stalkerware on iPhone — protect your privacy
    Feb 11, 2023 · If the stalker is looking to monitor your every action on the iPhone, then one of the most common methods is to use a device management profile.
  48. [48]
    WARNE: A stalkerware evidence collection tool - ScienceDirect.com
    We develop a semi-automated tool intended for use by investigators, helping them to analyze Android phones for potential threats in cases of IPV stalkerware.
  49. [49]
    How To Remove Stalkerware From Android - Proven Data
    Mar 22, 2024 · A factory reset can effectively remove stalkerware from an Android phone since it restores the device to its original state, erasing all data and applications.
  50. [50]
    Stalkerware detection, removal and prevention
    Sometimes stalkerware is also called spyware. Spyware is the umbrella term for commercially available stalkerware, but it also includes tools used by ...
  51. [51]
    Follow Cybersecurity Best Practices to Protect Yourself from ... - CISA
    Keyloggers, rootkits, stalkerware, and trojan horses are technologies that threat actors of varying levels of sophistication can use to track you and access ...Missing: reputable | Show results with:reputable
  52. [52]
  53. [53]
    The Best Parental Control Apps of 2025 - SafeWise
    FamilyTime lets parents see a detailed call log history, general app and device usage history, web browsing history, and YouTube and TikTok watch history.Missing: employers | Show results with:employers
  54. [54]
    Is It Legal to Put Spyware on a Child's Phone? | Expert Q&A
    Sep 30, 2019 · In two-party consent states, recording audio or video without all parties' permission is generally illegal.Is It Legal to Monitor a Family Member's Phone in Texas? - JustAnswerExpert Answers on Cell Phone and Computer Spy Software IssuesMore results from www.justanswer.com
  55. [55]
    Is there really software monitoring WFH? What kinds of reports are ...
    Aug 29, 2022 · To answer your question though, large companies usually have device management software installed in their computers such as SCCM/MECM/Intune.Is it possible for parents to monitor my internet activity somehow ...What do you think about employee monitoring tools? - RedditMore results from www.reddit.com
  56. [56]
    Never leave kids and employees unsupervised. - Kidlogger
    Many psychologists believe that informing the employees about the monitoring software installed on their devices will raise up the level of their discipline ...Missing: legitimate employers
  57. [57]
    Stalkerware Fuels Technology-Enabled Abuse - ASIS International
    Jan 1, 2021 · In France, domestic violence reports rose more than 30 percent. In Latin America, reports of intrafamily violence against women climbed ...<|separator|>
  58. [58]
    Stalkerware Maker Fined $410k and Compelled to Notify Victims
    Feb 8, 2023 · The apps track victims' locations and allow abusers to read their text messages, monitor phone calls, see photos, videos, and web browsing, and ...
  59. [59]
    Stalkerware – Is Somebody Watching You? - Network Intelligence
    Brooks Owen Laughlin was accused of domestic violence and stalking his wife by tracking her movements using her iPhone's Find My iPhone feature. Many women ...
  60. [60]
    NYC has hired hackers to hit back at stalkerware
    Aug 14, 2019 · Abusers leverage high-tech tools in the oldest of crimes, stalking their victims through tools like Facebook Messenger and Apple Maps. They spy ...
  61. [61]
    [PDF] The State of Stalkerware in 2023 - Kaspersky
    Stalkerware is commercially available software that can be discreetly installed on smartphone devices, enabling perpetrators to monitor an individual's private ...
  62. [62]
    Thwart Me If You Can: An Empirical Analysis of Android Platform ...
    Aug 4, 2025 · Stalkerware technology facilitates intimate partner violence by allowing the abuser to monitor victim's sensitive information including location ...
  63. [63]
    Annual Kaspersky report on stalkerware highlights the link between ...
    Kaspersky's data shows that in 2021 close to 32,700 unique global users were affected by stalkerware. This is a decrease from our 2020 numbers and a ...
  64. [64]
    Stalkerware usage surging despite data privacy concerns
    Mar 20, 2024 · And unlike other insidious apps or malware installed on victims' mobile devices without their knowledge or consent, removing the stalkerware ...Missing: prevalence | Show results with:prevalence
  65. [65]
    [PDF] Digital Stalking in Relationships
    A particularly pessimistic interpretation could suggest that almost half of the surveyed population has personal experience of stalkerware, either as a victim ...Missing: statistics | Show results with:statistics
  66. [66]
    Abuse Using Technology: What types of laws address computer ...
    There are several federal laws that address computer crimes, including the Computer Fraud and Abuse Act and the Wiretap Act. Many states also have specific ...
  67. [67]
    Cyberstalking Laws by State - Clario.co
    Mar 27, 2025 · Instead, prosecutors rely on general stalking or harassment laws, which often carry lighter penalties—like misdemeanors for first-time offenses.
  68. [68]
    Addressing stalkerware and gender-based abuse through data ...
    Sep 10, 2019 · It is possible to use the GDPR as a legal instrument to shut down stalkerware companies due to non-compliance around consent and collection of personal data.Missing: Union | Show results with:Union
  69. [69]
    Will the EU Give Companies Selling Spyware and Stalkerware a ...
    Nov 13, 2023 · Will the EU Give Companies Selling Spyware and Stalkerware a Free Pass? Proposed Legislation Should Force Companies to Scrutinize Value Chains.Missing: regulations | Show results with:regulations
  70. [70]
    Coalition Against Stalkerware (EN)
    Mar 22, 2022 · The Coalition Against Stalkerware welcomes the inclusion of cyberstalking and cyber-harassment in the new European Commission's proposal on ...Missing: regulations Union
  71. [71]
    Tracking a partner with smart tech considered stalking under ...
    Sep 2, 2024 · Tracking a partner with smart tech considered stalking under changes to NSW domestic violence laws. This article is more than 1 year old.Missing: stalkerware | Show results with:stalkerware
  72. [72]
    Australia launches program to curb stalkerware - CyberScoop
    Mar 18, 2022 · Australia launches program to curb stalkerware. The initial ... law sparks global concerns over end-to-end encryption for messaging ...Missing: legality | Show results with:legality
  73. [73]
    Tracking device laws need tightening in light of their use in domestic ...
    Jun 27, 2024 · A Queensland Law Reform Commission (QLRC) report handed down in 2020 noted there were "gaps and uncertainties" in the laws for surveillance ...<|separator|>
  74. [74]
    International Legislation - Stalking Risk Profile
    Many countries lack specific anti-stalking laws, but some have relevant laws. This list is based on known legislation, and some laws may be missed.
  75. [75]
    Taking a stand against online stalking - Interpol
    Apr 21, 2021 · Fighting against the multifaceted issue of stalkerware requires global and collective action from law enforcement, cybersecurity vendors, ...
  76. [76]
    [PDF] Cyberstalking: A Growing Challenge for the U.S. Legal System
    The number of federally prosecuted cyberstalking cases has grown steadily since 2014, reaching a peak of 80 cases filed in 2019 (then falling slightly in 2020), ...
  77. [77]
    [PDF] Current Research, Challenges, and Future Directions in Stalkerware ...
    Of these, 175 papers were excluded for being unrelated to Stalker- ware, such as general Android security, IoT security, or Android malware detection techniques ...
  78. [78]
    [PDF] The State of Stalkerware in 2022 - Kaspersky
    In addition, the data reveals a stable proliferation of stalkerware over the. 12 months of 2022. On average, 3333 users each month were newly affected by.
  79. [79]
    Stalkerware: Violates Privacy & Perpetuates Digital Abuse
    Sep 29, 2020 · By Joanne Kim. Google has started sweeping their search engine clean of products promoting intimate partner surveillance as part of an ...
  80. [80]
    What makes the legal spying software — stalkerware - Kaspersky
    Apr 3, 2019 · Legal spying apps (stalkerware or spouseware) are not malware proper, but are potentially harmful anyway.Missing: concerns ethical
  81. [81]
    Unethical Stalkerware Apps Offer Parents Tools to Spy on their ...
    Feb 23, 2021 · PRNewswire/ -- Avast (LSE:AVST), a global leader in digital security and privacy products, and member of the Coalition Against Stalkerware, ...Missing: ethical critiques violation
  82. [82]
    Stalkerware: An Overlooked Harm Draws the Attention of the FTC
    Oct 16, 2021 · Despite the privacy infringement and abuse that stalkerware enables, the creation and use of these apps has been sparsely prosecuted. Under ...Missing: controversies | Show results with:controversies
  83. [83]
    [PDF] The State of Stalkerware in 2021 - Kaspersky
    Cerberus and Reptilicus were the most used stalkerware applications, with 5,575 and 4,417 affected users, respectively, globally.Missing: commercial timeline
  84. [84]
    [PDF] ANDROID STALKERWARE VULNERABILITIES
    If nothing else, stalkerware apps encourage clearly ethically questionable behavior, leading most mobile security solutions to flag them as undesirable or ...
  85. [85]
    mSpy Data Breach - Have I Been Pwned
    In May 2015, the "monitoring" software known as mSpy suffered a major data breach. The software (allegedly often used to spy on unsuspecting victims), ...
  86. [86]
    Sensitive Data of Millions Stolen in MSpy Breach - InformationWeek
    Jul 18, 2024 · In yet another massive breach, attackers stole sensitive information of millions of people using the phone monitoring app.
  87. [87]
    Hackers explain how they "owned" FlexiSpy - Help Net Security
    Apr 26, 2017 · How did the hacker group that goes by the name Decepticons breach "stalkerware" manufacturer FlexiSpy? They say it was easy.Missing: vulnerabilities | Show results with:vulnerabilities
  88. [88]
    Data Breach Report: March 2025 Edition - PKWARE®
    Apr 9, 2025 · March 2025 data breach report: NYU, Oracle Cloud, JLR, SpyX, Angel One & more. Explore the details & impact of these cybersecurity ...
  89. [89]
    Following Data Breach, Multiple Stalkerware Apps Go Offline
    May 22, 2025 · Stalkerware apps, while legal, have been a topic of controversy for some time now as they are often used in situations involving abusive ...
  90. [90]
    Spyware App pcTattletale Hacked: Victim Data Potentially Leaked
    May 28, 2024 · A hacker breached pcTattletale, a U.S.-made consumer-grade spyware app, potentially exposing victims' private data.
  91. [91]
    Parental Rights vs. Child Privacy: The Legal Debate Over Phone ...
    Mar 4, 2025 · Instead of relying on invasive monitoring apps, parents can choose devices designed to limit exposure to harmful digital content from the start.Missing: intrusion | Show results with:intrusion
  92. [92]
    Laws and Ethics of Employment Monitoring and Privacy
    Oct 3, 2024 · Federal privacy laws, as well as most state privacy laws, give discretion to employers regarding how far they can go with employee monitoring programs.
  93. [93]
    Parental Monitoring of Early Adolescent Social Technology Use in ...
    Jul 4, 2025 · The results of this study reveal that restrictive parental monitoring of adolescents' digital media use is positively associated with child's problematic ...Missing: debate | Show results with:debate
  94. [94]
    [PDF] REGULATING STALKERWARE USE: - Tech Policy @ Sanford
    In a private interview, Galperin suggested that stalkerware use will spike post- COVID-19 as abusers now have more opportunities to install the malware on the ...
  95. [95]
    Technology-Facilitated Abuse in Intimate Relationships - NIH
    Technology-facilitated abuse (TFA) is a significant, harmful phenomenon and emerging trend in intimate partner violence.
  96. [96]
    The State of Stalkerware in 2021 - Securelist
    Apr 12, 2022 · In addition, abusers, unfortunately, have a wider range of means, in the form of smart devices, to spy on or stalk their victims. Non-profit ...
  97. [97]
    [PDF] The State of Stalkerware in 2019 - Kaspersky
    Studies have shown that 70% of women victims of cyberstalking also experienced at least one form of physical or/and sexualised violence from an intimate partner ...
  98. [98]
    EPIC and Many Other Civil Society Groups Oppose Stalkerware ...
    Aug 25, 2025 · EPIC and Many Other Civil Society Groups Oppose Stalkerware Executive's Attempt to Escape Accountability from FTC Order ... criminal prosecution, ...<|separator|>
  99. [99]
    H.R.6173 - 118th Congress (2023-2024): Tech Safety for Victims of ...
    This Act may be cited as the “Tech Safety for Victims of Domestic Violence, Dating Violence, Sexual Assault, and Stalking Act”.
  100. [100]
    Stalkerware in 2021: signs, threats, consequences - Kaspersky
    Apr 12, 2022 · In most cases, recording users' actions without their consent is illegal. Stalking software perfectly fits this description.Missing: controversies | Show results with:controversies
  101. [101]
  102. [102]
    Prohibition on Use by the United States Government of Commercial ...
    Mar 30, 2023 · It shall not make operational use of commercial spyware that poses significant counterintelligence or security risks to the United States Government.