Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | Snapchat Symbol Meaning

author photo

How to Figure Out Who Hacked Your Phone

by on June 16, 2020
in Privacy, Phones and Mobile, Cell Phones, Mobile Apps, Android Apps, iPhone/iPad Apps, Tips & How-Tos :: 271 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

For most of us, our phones are the center of our daily lives, and as a result, they contain a treasure trove of personal information, from banking details to messaging and email accounts. This sensitive data can be pretty enticing to a range of the nefarious, from cybercriminals to someone you may even know.

Phone hacking can involve the unknowing download of spyware that relays information on your activity – such as logging keystrokes to scrape passwords; spy apps downloaded by someone with access to your device; or other malware that exploits your phone, for example by using its internet bandwidth in a botnet, as occurred with malware that infected nearly 20 million Android devices.

“The most common way that smartphones can be hacked is to infect the device with malware,” says Victor Chebyshev, a security researcher at Kaspersky Lab. This malware can arrive on the device buried inside apps downloaded by the user – and the likelihood of a malicious app rises when downloading away from the official app stores, which police their content.

While iPhones aren’t immune to hacking, Apple’s strict vetting policy means the incidence of bad apps targeting iPhones (at least non-jailbroken ones) is lower than for Android phones. “Android devices are more susceptible to these kinds of attacks because they have the option to install applications from third parties,” says Chebyshev.

9 steps to figuring out who hacked your phone

A sluggish phone or fast-draining battery are common symptoms of a compromised phone – but they can also indicate your device needs a spring clean to spruce up performance or improve its battery life. Another red flag is if your data usage has gone through the roof – this could indicate a dodgy app is sending data back to its mothership.

“Whether a user can determine who is responsible for a compromised phone depends on what kind of threat was on the device,” says Chebyshev.

According to Verizon’s 2020 Data Breach Investigation, 86% of cyberattacks are motivated by monetary gain – for example, through selling someone’s stolen credentials on the dark web, gaining access to financial accounts, or hacking sensitive data and holding the victim to ransom. In these cases, hackers usually rely on malware that remotely exploits vulnerabilities in apps or operating systems to steal information (or in the case of phishing malware, trick people into inputting their critical data).

However, somebody known to you who wants to monitor your movements – whether that’s a disgruntled ex or suspicious parent – and who has physical access to your device might also be able to install a spy app that acts like malicious software, tracking your location, photos, messages and calls.  

To narrow down the field of suspects, you can try to determine exactly how your phone is being compromised.

1. Check your phone bill

Are you being charged for premium-rate texts you never sent – or texts you never signed up for? You’ve probably been infected by malware that forces your phone to send or receive texts that generate revenue for cybercriminals. This common form of mobile malware is believed to be the first type found targeting Android, back in 2010, and today plenty of it is still floating around.

If you’re receiving premium-rate text messages, try texting STOP to the number. If this doesn’t work, you’ll have to contact your cell carrier who should be able to block the number.

If your phone is sending the texts, you may be able to fix it by running a security app such as Bitdefender or McAfee to find and remove malware (on Android only; security apps for iOS don’t have this feature). Also, try deleting any third-party messaging apps and any other apps you installed just before the phone started sending the texts.

2. Go through your apps list

If there are any apps you don’t remember downloading, look them up online to see if any of them have been reviewed negatively for malware or other suspicious activity. In this case, the apps will have been compromised by a hacker who likely isn’t targeting you personally but is distributing malware with the aim of scraping as much data as possible. The BankBot malware, for instance, is a trojan that has infected hundreds of Android apps to display a phishing screen to steal users’ banking credentials.

“If it was a regular trojan [malware coded within another app] the user will not be able to attribute who was responsible for the attack,” says Chebyshev. “If it was commercial spyware, it’s sometimes possible to figure out the responsible person.”

3. Look up your flashlight and battery-saver apps

Got a phone full of apps and can’t remember for sure which you downloaded? Some categories of apps have attracted more than their fair share of malicious actors – several flashlight apps on Google Play were infected with malware that tried to scrape users’ financial info, while one should be wary of battery-saver apps as they have often been used for malware, says Josh Galindo, director of training at phone repair service uBreakiFix

If you have these types of apps, check online for any negative reviews. You can also try deleting them to see if this affects your phone performance. “If you install an app and the device performance decreases, that’s an indicator,” says Galindo. “If you uninstall the app and your device begins working properly again, this means that the app is likely contaminated with malware and you should avoid downloading it in the future.”

4. Double-check your favorite popular games

Downloaded a new super-popular game recently? Ensure it operates like it’s meant to – and validate that by looking up reviews online – otherwise it may be a scam version, potentially ridden with cryptojacking malware.

Cryptojacking trojans mine cryptocurrency unbeknownst to users, and their prevalence has risen on smartphones that when infected in thousands, can deliver attackers a high overall processing power. The idea is that, if a cryptojacker hacks other devices, they can get paid for mining without having to use their own resources (or pay the electricity bill).

On mobile, cryptojacking malware tends to hide inside innocent-looking apps such as fake versions of popular games. If your phone slows down, heats up and its battery is dying long before the end of the day – and you’ve tried to improve your battery life– it could be a sign that a malicious app like a cryptojacking trojan is hogging all the juice.

They’re mostly prevalent on Android – and if you’ve downloaded from non-official app marketplaces, the risk is higher.

5. Scroll through your call list

Done all of the above and still convinced that someone somewhere has your personal data, siphoned from your smartphone? Apps aren’t the only way a phone can be infected by malware. Have you picked up any random calls lately? “Callers offering a free cruise or claiming that you won a sweepstakes are likely scam efforts to hack your information or record your voice,” says Galindo.

6. Did you click that link?

If you recently clicked on a link on a text message or an unexpected pop-up, you may have inadvertently fallen prey to phishing. Phishing often preys on panic or high emotion – as in the coronavirus-related scam texts claiming that receivers had been exposed to someone with COVID-19 symptoms, and exhorting them to click for more information.

It’s often impossible to divine who is behind such scams, although you can report any phishing texts to your cell carrier and block these numbers.

7. Consider the last time you used public WiFi

According to Kaspersky Lab, one in four hotspots are unsecured, and even the ones that are password-protected could potentially be set up by someone with malicious intent. On top of that, the protocol (WPA2 or WPA3) that encrypts traffic between devices and routers can itself be vulnerable – as in the serious WPA2 flaw uncovered by researchers in 2017 that would have allowed certain traffic to be intercepted.

If your phone isn’t protected by a VPN and you logged into an unsecured public WiFi hotspot, it’s possible someone could have been spying on the connection – and scraped your sensitive information if you logged into your email or bought something online.

8. Is your iCloud safe?

iPhone user? A cracked iCloud login can allow someone to not only access your photos, but also make use of semi-legal spy software to remotely monitor your device’s calls, messages, contacts and location.

Luckily, enabling two-factor authentication for your Apple ID drastically reduces this risk, because if someone tries to sign into your account from a new device, you’ll receive an approval request and sign-in code on your iPhone (or other iOS/Mac devices linked to your Apple ID).

(To enable two-factor authentication, for iOS 10.3 and newer: Settings > [your name] > Password & Security. For iOS 10.2 or older: Settings > iCloud > Apple ID > Password & Security.)

However, a weak or reused password without two-factor authentication can put your account – and phone – at risk.

Here’s how it works: Many people use the same email address in their Apple ID as the login for dozens of online accounts. If this email address is revealed in a data breach, then hackers – who may purchase or find these login details at data dump websites – have access to your Apple ID.

Couple that with a weak password and your iCloud account can be breached by attackers who use cracking software to guess hundreds of hacked or common passwords in order to breach accounts.

Unfortunately, the same goes for an email and password combo that can be guessed or found out by someone you know who’d want to spy on you – especially if they can access your iPhone to use the two-factor code.

9. Run a security scan

Since most malware is designed to evade detection, you may not discover much on your own. Spyware apps – or stalkerware – is one category of particularly insidious apps designed purely to monitor a victim’s activity (rather than for any financial gain).

Security apps, particularly for Android, can help determine if your phone contains such a malicious app, as well as help fend off future cyber attacks by, for example, preventing you from visiting malicious webpages.

Android: Commercial spyware is unfortunately all too easy to find online. Such spy apps have system-level access to extremely detailed information about your device activity such as the messages you write, photos you take and GPS location – and what’s more, these apps are hidden from view.

They also need to be downloaded physically to your device, which means if they’re on your device it was done by someone with access to your device (and your PIN). Chances are, you can figure who in your life would want to monitor your phone. 

To find out if you have such apps on your Android phone, download a security app such as Bitdefender or McAfee, which will flag any malicious programs. You can also head to Settings > Security > Device administration and check if “Unknown sources” for app installations is enabled (and you didn’t do it) – this allows apps from non-official app stores, on which there’s likely to be far more stalkerware.

iPhone: Spy apps on a non-jailbroken iPhone are far less prevalent since such software – which tampers with system-level functions - doesn’t make it onto the App Store. (However, they do exist and work via someone knowing your iCloud login and password.)

If your iPhone is jailbroken, that opens it up to potentially malicious apps that haven’t been vetted by the App Store, including spy apps downloaded without your knowledge.

Security apps such as Lookout and Sophos will alert you if your iPhone has been jailbroken – so if you’re alerted of this but haven’t done it yourself, that can be a red flag.

However, whether security software – for Android or iOS – can find spy apps will depend on how sophisticated or new the spy app is since security software scans for malware that’s already known. (That’s why it’s crucial to download updates to security software as soon as available since updates will incorporate new instances of discovered malware.)

3 steps to take if your phone has been hacked

1. Delete any apps or messages that may be malicious

If deleting them fixes any performance issues, great. Even if not, it’s a good idea to clear your device of apps that may have been flagged from that security scan.

You can also try shutting down apps one by one, as soon as your phone starts to slow down or heat up. If shutting down a particular app seems to return things to normal, that app may be malicious – or at the very least, not play too well with your device.

2. Do a factory reset

If after deleting the suspicious app(s) your phone is still behaving strangely, this nuclear option is a quick way of clearing your device of malicious – or sluggish – software left behind.

Android: Settings > System > (Advanced) > Reset options > Erase all data

iPhone: Settings > General > Reset > Erase All Content and Settings

3. Check if your information is out there

Unfortunately, many hacks and malware present few to no symptoms and often the only time people are aware of a breach is when their digital services are hacked, or, worse, they’re the victims of identity fraud, where hackers have used their stolen information to open accounts or lines of credit. 

There are a few tools you can use to check if any of your information has already been compromised. Have I Been Pwned? is a website run by security developer and Microsoft Regional Director Troy Hunt that checks if email addresses have been exposed in breaches of popular apps and services.

Security apps including Bitdefender (Android) and Lookout (iOS) can also alert you if apps and services you use have been breached, putting your personal information at risk.

Depending on the scale of the data that has been exposed, you may want to set up a fraud alert at the major credit agencies, which will require any potential creditors to request additional verification of your identity.

Keeping your smartphone safe

If you find that your logins – particularly passwords – are floating around online, the first thing to do is to change your passwords. The best way to do that is to use a password manager which can automatically generate and save complex, unique passwords for each of your accounts. Check out our top-rated picks here. We like the Dashlane password manager, whose Premium version (from $4.99/month) also scans the Dark Web for instances of your emails or logins being posted for sale.           

And to reduce the risk of future phone hacks, always observe general cybersecurity hygiene:

  • Think twice before clicking links in SMSes, other messages and emails
  • Review app permissions to minimize the risk of a malicious app download.
  • Enable two-factor authentication for every online account possible – and especially primary emails and logins like your Apple ID.
  • Download security updates for your phone when available to patch vulnerabilities that could otherwise be exploited.
  • Protect your device with a PIN or biometric authentication.

Updated on 6/16/2020 with new tips and recommendations

[Image credit: phone hacker concept via BigStockPhoto]

Natasha Stokes has been a technology writer for more than 7 years covering consumer tech issues, digital privacy and cybersecurity. As the features editor at TOP10VPN, she covered online censorship and surveillance that impact the lives of people around the world. Her work has also appeared on BBC Worldwide, CNN, Time and Travel+Leisure.

Discussion loading

Find hacker name

From Mahesh Kumar on June 17, 2020 :: 10:48 pm

One who a person hacked my phone I must know his or hes name is it possible



From MGR on June 29, 2020 :: 5:26 am

someone has hacked my instagram account and typed messages to random people



From Bbb on June 29, 2020 :: 3:41 pm

It’s not funny being hacked, and most of these stories seem fake!!!  All I know is that, they should have a law against them!! For life!! A lot of jealousy, envy, lies, I have no words!!  Karma will be their downfall!! That I promise you!! One day!! One day!!!  They forget when they hurt someone or follow someone, ,,,,,,,,,,,,


They think we don't know that we're being hacked Part 2

From Smart cookie on June 29, 2020 :: 5:44 pm

Part 2 of: They think we don’t know that we’re being hacked part 1

Well one I have a social following of a couple thousand and on top of that I was fooled by this hacker thinking he/she was one of my friends and I stupidly went and followed a link that I belive helped give remote access to them. Well I know that was my mistake but it also should have been something that one of those companies who claim to protect your data should have the knowledge to fix!!! You would think right wrong, the only ones who did see the hacking happening was my eBay account but the hacker since found away around that too. So if anyone who feels like this is not only violating but traumatizing and completely mortally wrong by these companies who continue to say “we protect your data” well that is the biggest lie of all I’ve been told a number of times that they only thing was they suggested getting a security key well guess what the hacker got one instead so when id try to log in some of them wanted a security key they asked me for it to access my account I couldn’t belive that I was no longer able to access some of my many accounts due to this hacking. Oh and the 2 step that didn’t work well either he was just able to redo it and change my information or use my backup codes that too forgot they even were able to message as me to the companies as if everything was fixed and they also was able to delete my backups that I’ve had for many years so as I said this was and still is so traumatizing and violating im so stressed i spend hours on phones trying to deal with this im very fortunate that i don’t have to work at this time but what about the people who do have to work take care of family or just have a life outside of being in your phone well that has now become my reality everyday for over a year and I do have a family that has also been emotionally effected due to this because of the fact my focus has now been trying to get this hacker out of my system I really have been dealing with this so much that I’ve learned somethings but at this point I’m not even able to go on most sites and also I don’t even receive my phone calls because they are controlling my ringer and even my voice-mail too. Continue reading part 2 didn’t have enough room for what I was saying sorry everyone! friends constantly tell me I called you and I was like sorry I didn’t receive any call!!! Well Im just so sick and tired of dealing with this and these companies continue to get paid and say to me “I don’t know what to tell you” seriously you don’t know how to help me that what I get from them.  So if your tired and feel violated and disgusted and just know that this needs to change I’m standing up and fighting back because it’s not about the money it’s the point that they can’t even help you to get the hacker out of your system even Norton through Life Lock haven’t been able to fix this issue so why am I paying them well I’m canceling since they haven’t been able to change one thing that this hacker controls so if your interested I’m looking for an attorney for the past week remember this has been going on for over a year of this hacking! I’m exhausted, disgusted and completely sickened by this that it is so easy and very possible for someone else to take over your life online!!! Thanks for this post. Sorry to anyone else this is happening to and also I’m sorry if this isn’t the correct forum to be posting this on. Have a great and wonderful day!! I wouldn’t wish this nightmare on my worst enemy and that’s saying a lot. Thanks for taking the time to read and thank you all for your comments and im so sorry for everyone who is dealing with this too! Take care


Sorry about this I'm going through similar too

From Spyg on June 27, 2021 :: 6:05 pm

I’m trying to post as much as I can to help everyone because this issue is becoming more and more prevalent. You also may need to use a disposable phone for the important things in your life. ALWAYS create dummy accounts with none of your personal information on it. ALWAYS. This will give hackers a run for their money and make it more tedious for them. I would wipe all devices in the home first. Put a VPN/Antivirus on all devices in the home. Disable location, cookies, activity, and privacy settings in all devices. Encrypt them all with a sd card or bitlocker if you have a windows computers. You are probably gonna need to buy a 32 g microsd card for your phones and encrypt it. Put a VPN and antivirus on your phone. If they have hacked your wifi then buy a new router and put a firewall on it. Use web pages like Tor or Startpage for added privacy. Get rid of all unsecure email accounts i.e. yahoo, gmail, aol etc and get a encrypted one.  DO NOT click on unknown links that come into your device or you get online. It will infect it with a bug that can bypass a VPN. Then you will have to master reset it again to get it out.


Same and same

From Jaime on February 26, 2022 :: 4:17 am

I am a researcher problem solver . I wasnt very savy before but all the tips given if you’ve lost multiple Gmails and phones they are useless. If they have you , they have you. Until the wild wild west web gets so overrun with fake identity and big business in this couny t y of control because nothing is truly safe for anyone, nothin



From Waghmare Nagaraju on July 07, 2020 :: 4:26 am

Plse help me my phone is hacking some one ple help me to learn darknet i want to defence my self while anyone hacks me plse



From Spyg on June 27, 2021 :: 6:11 pm

You need to encrypt your phone but wipe it first and then install VPN and antivirus. Don’t click on any unknown links even it chat rooms or and be careful on YOUTUBE and Facebook.



From Roelf on July 16, 2020 :: 10:18 pm

Hi I have been hack and its been going on for 6 months now. I am sou desprit for enny one that can help me. They stold more then 80k ($) from me pleade i need help and this person must be gourd. Try too get my money back and I do have information of this perso and proof and I need too get this guy of me like in today. Please help me and trust me you wil open n money scam on the net you wil not belef.


I hope you got this

From Roelf on July 16, 2020 :: 10:19 pm

I hope you got this email


You missed a few easy ones.

From Terance Healy on July 26, 2020 :: 10:29 pm

Begin using the two truths/one lie strategy in your phone calls.  When approached about the lie, you will have the person. Responsible.

Turn on location and have it start automatically.  Thus will result in you being notified if your phone has been cloned.  When they turn in phone, the map will point right to them.

Draw fences in Amazon Alexa around places where you think the person responsible is located.  When they turn in the phone, or cruds a boundary, Alexa can announce the clone is in that area.

You can also fence in police, county and private investigators.  When being so d improperly, often a PI willk be used to remove police from direct liability.



From Carl storms on July 28, 2020 :: 6:32 pm

I had someone hack my phone and stole personal videos and photos of me and my girlfriend and said he will put it all over social media and send to all my contacts if I don’t pay him a lot of money what do I do please help


Can you confirm you were hacked?

From Josh Kirschner on July 30, 2020 :: 10:31 am

Are you sure your phone was hacked? That’s pretty unlikely and there have been a number of porn blackmail scams going around where people claim to have compromising videos when they really don’t. If I had to guess, this may be what is really happening.

If they have shown you proof they have the videos, then you are in a difficult situation. If you pay, there’s no guarantee they won’t post them anyhow or keep coming back for more money. You may want to consider contacting the FBI since the hacking and blackmail are likely federal crimes. Though there may not be much accomplished by that beyond potentially scaring the person from taking further action.


Easy to do?

From Karen Burton on July 30, 2020 :: 12:34 am

I am a 61 year old woman on disability. Someone hack my Gmail account and now I only receive empty labels ie inbox, important, all mail etc. are empty. PLEASE HELP!!!


N I thought I was goin nuts

From Jeremy on August 08, 2020 :: 11:23 am

U have no idea how relieved I am to hear what you’ve written down. Ive been targeted for a little over a year… And had even contemplated suicide thinking I was going mad. But happily today after reading your post… Im damn near certain who has been playin w me.


I know who hacked all my accounts. I just NEED HELP proving it so I can lock them up!!!

From DL on August 19, 2020 :: 1:35 am

I have so many documents, files, pictures, and emails to prove I have been hacked. I don’t know exactly how to prove with documentation it is who I know it is. Myself and my two children have been impacted by this person. They are so advanced in hacking/coding and how to use third party software/apps they know how to cover their tracks so I can’t “prove” 100% it’s them. I need 100% to make them pay big time for what they have done and caused. Only a sick F’r can cause the torment they have caused.
Please can someone help?!


EREBUS666WHITEHAT please help

From John on August 23, 2020 :: 7:34 pm

You seem to be the exact person who has the proper knowledge about this. I am being hacked all day and night. Also followed and being accused of liking little boys. Seems like the people at Walmart and winco know something about me that I don’t. I don’t know what I did to get these people on me like this. I mind my own business and generally a good person with a good heart. Sure I watch porn at night and like being in the nude at my apartment but that’s as weird as I get. Oh and well I am a gay man..I don’tknow if that has anything to do with it. Please I would greatly appreciate your help


Find hacker name

From Mahesh on August 31, 2020 :: 8:46 am

Is there possible to know the name of the hacker



From Vasava pranali on September 07, 2020 :: 2:31 pm

This phone a hacked


My has been hacked

From Marlapudi sandeep on September 18, 2020 :: 5:50 am

My phone has been hacked plz help…


Please help me to get me life back

From Janka on September 22, 2020 :: 9:50 am

I have been hacked for over 5 years. I believe it’s my ex who officially has no contact with my daughter and his family didn’t contact me once since family court finished, therefore I believe they have access to my photos/ videos.
My devices randomly flashing while on video calls and I hear strange noises while on audio calls etc. Please help
Thank you for contacting me in advance
Any advise will be greatly appreciated



Stolen identity

From Sandra Criley on September 23, 2020 :: 7:25 pm

Someone has been using my old profile and getting in all my apps changing my passwords and adding a lot more and it’s slowing down my phone and causing a
lot of problems for me.


For the love of God

From Rey Dommert on September 29, 2020 :: 2:09 am

In the past 6-7 years and like 40 phones later I am still getting hacked. I have had every malware you can think of. Even Ransomware. Right? I even had my android guy appear suddenly on my phone fall on to his back and his tummy open up and fireworks blaze out for a minute or to then my phone was inoperative. A sad day in the life of Rey. Is there anyone who is willing to help me find this Individual,them,or what group they are associated with. Thank you


Yes my S9 has been hacked. I mean damn the words are blurred one second. Then they aint. Everythings

From Jeremy on October 05, 2020 :: 10:55 pm

My S9 is hacked.


s9 is hacked

From Jeremy on October 05, 2020 :: 10:58 pm

They get you to go to hangouts messenger app and thats where they hack your S9….....and yes mine too. Its hacked. Rey Charles can see it.


My phone ,internet is getting hacked please help!

From Jay on October 14, 2020 :: 3:12 pm

I am getting spam calls, test messages and emails. my laptop, phone is very slow.

I have reset my phone cleaned everything.
but the phone and home internet is getting hacked.
let me know if you can help


Gang stalking is FBI cia!

From Peggy on October 27, 2020 :: 10:47 am

This time of our lives is hard to wrap my head around and all of ur comments but reality is this time of pandemic is an advantage for the evil doers for contol and power! It’s more of a narcissistic mind f..k than anything. They are very intelligent and sneaky. I have been gang stalked now for 6 years they made it look like my x boyfriend..i didn’t even know they were the first 3 years. Don’t justify crazy shit..ITS REAL! AND LISTEN TO YOUR PETS. CATS WILL LOOK INTO THE ROOM AND C THINGS U CANT. DOGS WILL BARK AT THE AIR. The vehicles driving outside are loud and chaotic. Educate ourselves. It’s real!



From Troy Slater on November 13, 2020 :: 2:56 am

Photos were copied from both my gallery an instergram,as was a post on messenger between me and another bloke was copied.Can you please help me out,I no who it is but want to prove it was the person who has them


So what can be done about this?

From Anonymous on November 24, 2020 :: 3:12 pm

This keeps happening to me too. I keep getting new phones, service providers, accounts, etc, but it keeps happening.
I’m in az. but anything I look up refers to me being in dallas texas. Wich I am nowhere near at all. And my phone won’t even let me reply to by something online, or even send a pic MMS. I tried to go to tmobile website last night and it won’t even open. I ready to go ONCE AGAIN today to get a new phone and start over AGAIN like I have been having to do every other month today.  Does anyone or Wendy please help? Does getting a 5g phone and service end this nightmare? Or will it just make it faster? Please let me know asap? Thank you for any helpful advice. It’s very much appreciated!



From Jonathan on November 25, 2020 :: 7:33 pm

I also have an iPhone and I can hear people talking when I’m on the phone and pictures show up on my phone that I didn’t take as do reminders. What can I do? I’ve also got a new phone switched carriers etc.


It says "I have a comment from my msg yesterday. But I'm not seeing it...

From Anonymous on November 25, 2020 :: 10:34 pm

Hi. I left you an email yesterday. And today I got a reply/comment/msg back from you (it says)...
But I dont see anything at all as far as that goes . . . ???  Did you, or someone send a msg and it’s just not showing on my end? Or no ???
Please let me know? Thank you


0 check the BIOS

From In nneed on December 03, 2020 :: 10:41 pm

0 check the BIOS



From Otto on December 05, 2020 :: 2:03 am

I was hacked when i changed vpn at the same ip address. Stupid me. There was only a few seconds to do it but they did. If you change vpns go to different location. A full factory reset at a different location will fix it


Personal Pregotive

From Sean Fuller on December 09, 2020 :: 9:46 pm

I’m homeless and have been trying to find out why and who has been hacking into every online account I have. My brother offered to show me how to identify but I haven’t seen him in quite sometime. I’m also trying to determine what damage was done as well.


Don't worry about who it is just protect yourself

From Spyg on June 27, 2021 :: 6:15 pm

You need a encrypted email account ONLY. Use a disposable phone and do not connect your email to it unless a dummy account.


3phone 3 numbers 3 15

From Hacker Hater on December 12, 2020 :: 1:18 am

3phone 3 numbers 3 15 year accounts all in my stuff they messed up in beginning I had ran software showed IP address they hacked me on word for friends I confronted one he admitted i work for government they made my life hell. One punk is out of uk they cloned sim and doing crap from my phone and internet service. It’s countdown time I’m sad to read all the post but yet given me relief I’m not crazy at all this is happening. They are scum leeches.


3phone 3 numbers 3 15

From Hacker Hater on December 12, 2020 :: 1:18 am

3phone 3 numbers 3 15 year accounts all in my stuff they messed up in beginning I had ran software showed IP address they hacked me on word for friends I confronted one he admitted i work for government they made my life hell. One punk is out of uk they cloned sim and doing crap from my phone and internet service. It’s countdown time I’m sad to read all the post but yet given me relief I’m not crazy at all this is happening. They are scum leeches.


to help iv been hacked

From Lisa Burke on December 22, 2020 :: 12:45 am

I have been reading some of your post about someone hacking all your info. and now following you.  I have been going through this for four years now. It dosent matter how many wifi cameras or passwords i set up they always get past them and steal all of my things, mostly my clothes but also alot of other things.  You should know you are not crazy and you are not alone. this is happening to me and I cannot stop it and the police will not help me.


thank you for believing

From Lisa Burke on December 22, 2020 :: 12:49 am

I appreciate your post on what is called gangstalking.  I have been experiencing this now for four years and yes I have lost everything including the support of my family. it truley saddens me. thank you for your support


Running out of hope after severeness of hacking turned into being raped twice in 1 year- im ready to

From Laura Robbins on December 28, 2020 :: 1:57 am

Like many of all the comments Ive sat reading tonight, crying as I read them sadly Ive experienced every single thing everyone described over the last 3 years only mine escalated far worse with no end in sight either and no help. I have been raped on 2 different occasions now in the same year at 2 different addresses, which was my own home. Being raped in your own home leaves you no place to feel safe to go to and brings another whole level of fear. I also was arrested 9 times this last year for 7 misdemeanor and 6 felony charges with 46 counts for crimes I spent months sitting in county jails fighting for my freedom. I got lucky there because I save every single little insignificant thing and managed to have charges dismissed because I had but 99% of the stuff I have i dont have a clue how to understand when it comes to smart phones and computers. I have over 70 thousand screenshots, 84 devices hacked, cloned, hijacked, 312 email google accounts, 19 notebooks with accounts, and passwords, pictures AMD login credentials and wifi routers hacked Bluetooth speaker’s hacked, smart TV hacked, amd so so so much more. I just don’t know where to begin. My ex Im sure is doing it. I just dont know where or how to begin and honestly….i am not sure I have the energy anymore to even try if I knew how. The saddest part is his 1st wife ended up dead. Ruled she had asthma attack later i was told by the sister he killed her cuz sister accused him of same things and they fought just prior. I was drugged by him and found by his gma in her basement. He wont stop till Im dead and gone too. I know it. Ive spent 3 yrs running hiding protecting and fighting for my freedom and for my life. If someone can help I would be grateful…if not then it is what it is.


I hope things get better for you

From Spyg on June 27, 2021 :: 6:31 pm

Sound like you need to get a new router with a firewall and disable remote administration in it. Encrypt all of your devices and get a encrypted email. It can be daunting but it’s worth it. Stay away from google, edge etc. Try using privacy web browser pages like TOR, Startpage etc. Delete all unsecure email accounts like Yahoo, AOL, Gmail etc. just don’t use them their not safe anymore. Create dummy accounts and write down all passwords. I will send a prayer up for you I am sorry about this. Hope the courts catch who came into your home. When it comes to cyberstalking it’s new and not a lot of laws out their. You can file a Non-domestic PPO and/or send a cease and desist if you know who it is and have proof. Hang in their and try these steps. God bless


Mega hack

From Mandie on January 05, 2021 :: 2:34 pm

Ive had possibly 3 devices hacked with spyware such as hanja and ellie service apps .. My google compromised and i am having no luck at all.. After factory reset same thing happens.. Idk how to be this creepy stalker.. They have managed to hack through even software apps .. Bit defender is no help.. Idk what to do


need help been hacked.

From Jennifer brougbton on January 07, 2021 :: 2:36 am

Need help been hacked have 3 kids they also have been


sullivan county indiana

From matt on January 07, 2021 :: 2:43 pm

There are a group of people who have the software on the their phones to COM[PLETLY clone your phjone/computer/tablet just being near you, yes thats all they need!!Once they have gain entry they can see and record through your device camera and microphone.Have total acces to your location and and passwords saved to your device. It is a full blown privacy assault. Iknow this for a fact bc i have been a victom of this for 3 years.There is nothing you can do to defend against it and it cannot be removed . I have been through countless phones. I believe its as simple as that for your life to be complely assaulted. This is wicked software that i have not been able to find ANYONE discussing online. HELP!!!!!


spy your cheater boyfriend

From Sophia_Ava on January 10, 2021 :: 2:46 am

I have read all article. This post is more helpful for me.I have a cheater partner. He always cheat with me because he has an affair with my best friend Lara. I have no prove to blame him. Now I wanna catch him by hand. How can I get this cheater?


I will come back later and make serious commentary.

From David Tourville on January 11, 2021 :: 2:42 am

The group of hackers messing with me just changed my browser web page causing me to lose over two paragraphs of written material. Completely intolerable.



From David on January 12, 2021 :: 7:31 pm

Nothing to be ex-wife is not who I thought she was she is hacked my phone and it’s screwing with my entire life she has her nine-month-old daughter I haven’t seen my daughter in 3 months she just disappeared on me she’s been mentally abusing the hell out of me I need your help to prove everything please contact me [PERSONAL INFORMATION REMOVED BY EDITOR]


My wife has control of

From David Gray on January 12, 2021 :: 7:33 pm

My wife has control of my phone is driving me crazy she’s trying to drive me crazy


All my accounts have been for probably 4 years or so

From Rockie Vincent on January 20, 2021 :: 8:48 pm

I been tho like probably 20 phone’s 5 tablets 2 computers iget null files that I can’t open I’ve lost all control over my devices where someone else has taken all control over and I couldn’t stop it I’ve been tho account after account its like they just get information out and i can’t stop it I’ve have found system apps that just don’t look like they belong and system credentials that looks like they don’t belong and every device I get always end up with apps that r the same every time and out of 20 different phones and tablets there is no way all these different devices r going to start up with the same things every time and new system apps pop in every once in awhile what can I do I’ve had enough off this I need help I’ve called the FBI the cops I’ve tried security apps Samsung on one of my phone’s noticed it and they sent me some where to have it everything whiped and had all new put on it and it just happened again it I just run a few basic apps please help what can I do I’ve tried everything


Hard to pinpoint

From Spyg on June 27, 2021 :: 6:21 pm

But if the hackers have gained access to your network and router. You need to swap routers and put a firewall on it. Disable remote administration to keep them from control your computer. Install VPN, Anti-virus, wipe all devices before do this. Don’t click on unknown links. Encrypt everything. Disable cookies, all privacy settings, location in your devices and web broswers. Stay away from chrome/google and use private web browsers like Startpage, TOR etc.


Read More Comments: 1 2 3 4 5 6

Love getting helpful tech tips? Subscribe to our free newsletter!

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.