stalker following woman

Cybersecurity Companies Partner Up With Domestic Violence Charities to Fight Stalkerware

The Coalition Against Stalkerware hopes to be a resource for abuse victims and a pathway for security companies and advocacy organizations to work together.

Security companies and organizations that serve domestic violence survivors have formed a coalition to stop the spread of “stalkerware,” the term used to describe apps or malware that can steal messages, track people’s movements and turn on phone cameras without the user’s consent.

The Coalition Against Stalkerware has several long-term goals, including the development of best practices for detecting stalker apps and promoting public awareness of the dangers of stalkerware. Above all, the coalition’s site aims to be a one-stop shop for domestic violence victims who need more information about how to protect themselves from stalkerware and the steps they should take after discovering a tracking app on their devices.

Ten organizations have signed on as partners so far, including cybersecurity companies Avira, Kapersky, NortonLifeLock and G DATA Cyber Defense. Advocacy organizations from the U.S. and Europe are also part of the coalition, including the National Network to End Domestic Violence and the Electronic Frontier Foundation, a digital rights group.

The coalition cited a growing number of stalkerware victims seeking assistance with the issue and the high amount of stalkerware variants available to abusers. Kapersky said it detected 380 variants in 2019, a 31 percent increase over last year.

Read more: FTC Bans Company From Selling ‘Stalkerware’ Monitoring Apps

“In order to counter this issue, it is important for cybersecurity vendors and advocacy organizations to work together,” said Vyacheslav Zakorzhevsky, the head of anti-malware research at Kapersky.

Zakorzhevsky noted that the IT security industry can do its part by improving detection of stalkerware and notifying users of the privacy threats as advocacy organizations continue to directly work with victims and provide feedback to cyber companies.

“Acting together, shoulder to shoulder, we will be capable of assisting survivors through technical expertise and capacity building,” he said.

The initiative also has the potential to help abuse victims determine how to react if they discover stalkerware on their devices. For instance, if an abuse victim immediately deletes an app from their device, the app could alert their abuser and cause more immediate harm to the victim. In addition, deleting stalkerware could erase evidence that would be crucial in a law enforcement investigation, according to the coalition.

Anna McKenzie, the communications manager for the European Network for the Work with Perpetrators of Domestic Violence, noted that cyberstalking often goes hand in hand with other forms of abuse, including physical and sexual violence. The problem cannot go on unaddressed, she said.

“The Coalition Against Stalkerware enables us to bring our knowledge on gender-based violence and perpetrators to IT security companies – so we can work together towards ending violence against women and girls perpetrated via new technologies,” McKenzie said in a statement.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.


  • Enforcing Zero Trust in a Hybrid Work Environment

    Enforcing Zero Trust in a Hybrid Work Environment

    The effects of the pandemic have rippled across the business world like a meteor hitting a pond, creating a new plethora of challenges that incorporated into MBA curriculum for years to come. Read Now

  • First Responders Give NIST Their Communications Tech Wish Lists

    First Responders Give NIST Their Communications Tech Wish Lists

    Our first responders have spoken. An extensive research project conducted by experts at the National Institute of Standards and Technology (NIST) reveals what our country’s police, fire, emergency medical and 911 dispatch responders think about the communications technology they use on a regular basis and how they would like developers to improve it in the future. Read Now

  • Study Finds U.S. Enterprises Hit by Short-staffed Security Operations Centers

    Study Finds U.S. Enterprises Hit by Short-staffed Security Operations Centers

    ManageEngine, the enterprise IT management division of Zoho Corporation, recently announced results from its new study, Cloud Security Outlook 2023. The study found that enterprises have a limited number of analysts running their security operations centers (SOCs) and are deploying multiple tools in an attempt to address their cloud security challenges. Read Now

  • Report: More Than Half of Organizations Have Experienced an Insider Threat in the Past Year

    Report: More Than Half of Organizations Have Experienced an Insider Threat in the Past Year

    Gurucul, a provider of solutions in the Next Generation SIEM market, and Cybersecurity Insiders, a 600,000+ member online community for information security professionals, recently released its annual 2023 Insider Threat Report. Overall, results indicate insider threats are a top concern at organizations of all kinds; only 3% of respondents surveyed are not concerned with insider risk. Read Now

Featured Cybersecurity

New Products

  • PDK IO Access Control Software

    PDK.IO Access Control Software

    ProdataKey now allows for "custom fields" within the interface of its software. Custom fields increase PDK's solutions' overall functionality by allowing administrators to include a wide range of pertinent data associated with each user. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • Tyco Kantech EntraPass security management software

    Tyco Kantech EntraPass security management software

    Johnson Controls, the global leader in smart, healthy and sustainable buildings, and architect of the Open Blue digital connected platforms, has released the newest version of the Tyco Kantech EntraPass security management software. 3