Seeking Solutions: How to Deal with Stalking and Digital Invasion
In today’s increasingly digital world, the threat of cyberstalking and unauthorized access to personal devices is a pressing issue that many individuals face. If you find yourself in a situation where you suspect someone has gained undue access to your computer or smartphone, it’s crucial to know the warning signs, take immediate action, and explore effective solutions.
Unusual Activity: Recognizing the Signs
Last year, I experienced increasingly alarming anomalies on my computer and smartphone. It began with odd behaviors—my computer’s browser tabs would open and close spontaneously, songs played without my command, and the mouse cursor appeared to move independently. On my Android device, I noticed apps behaving strangely: icons shifting when I wasn’t touching the phone and pages scrolling without my input.
A particularly unnerving incident occurred when I arrived home, and a video began playing on my Android phone right as I stepped inside my door. I hadn’t accessed the video myself; it seemed to appear out of nowhere. Even more disturbing were instances where I could hear background noise during conversations, suggesting that someone might be listening in.
Taking Action: The Decision to Disconnect
Feeling increasingly unsafe, I decided to part ways with my computer. One day, while using Firefox, I noticed an unfamiliar text blink in the corner of my screen—a suspicious website address. Moreover, I discovered that my previously empty hard drive now contained several gigabytes of data. Given the possibility that a hacker with root access could frame me for illicit activities, I felt it was imperative to sever my connection to this potential danger.
I transitioned to a basic phone without internet capabilities, hoping this would reduce my risk of being hacked. However, even this device brought new concerns. Notifications appeared suggesting unknown apps, despite the absence of internet access, and I experienced strange sounds when locking and unlocking the device. Messages would even delete randomly, exacerbating my fears.
The Challenge of malware and Digital Security
Unfortunately, my concerns didn’t end there. I worried that the hacker could infiltrate my cousin’s smartphone through our communications, putting him at risk, too. Reconnecting to the internet seemed like a tempting option, as it would allow me to use a laptop with more security measures, such as frequent hard drive formatting. However, I was aware of the risks. malware can reside in routers, meaning that even a new device could still be compromised if I wasn’t careful. If my cousin were to visit and connect to
Share this content: