If I log on to someone's tethered WIFI, that is to say a hacked phone, am I in danger?

Regaliz Negro

New member
I actually have several questions:

1. If a friend of mine hacked his phone to basically create a WiFi hotspot and both he and I could log on with our laptops, would he have access to info on my laptop? Would he be able to hack my information just because I've logged on to his hacked/tethered network?

2. What are all the ways to steal someone's information. I'm aware of keylogger/stroke software that you can download on someone's computer and later view information that the software stores, but that's only if you share the computer with the person you're spying on. I'm aware of a more remote keylogger/stroke spyware that only requires one time access to the person's computer and then information is emailed to another location (the person doing the spying). These are the only effective ways that I know of. Are there any others?

3. Are there programs that allow for inputing someone's BASIC information that can create algorithms for finding peoples PERSONAL/PRIVATE information.

4. What is the best anti-spyware/ spy-ware detector for a MacBook?

I'm trying to figure out if someone is talking bs or if I should really take some measures to protect myself. Therefore cited literature/references would be greatly appreciated. Thank you!
 
Back
Top