Tech Made Simple

Hot Topics: How to Fix Bluetooth Problems | Browse the Web Anonymously | Complete Guide to Facebook Privacy | How to Block Spam Calls

Use It

author photo

Is Someone Spying on Your Phone?

by on March 30, 2012
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 758 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

[Editor's note 2/9/17: Since this article was written five years ago, many new phone hacking methods have been developed and/or discovered. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see: http://www.zdziarski.com/blog/?p=3820]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.



Discussion loading

gravatar

"secretly intercepting electronic communications without

From Jackie on October 25, 2015 :: 11:18 pm

“secretly intercepting electronic communications without the person’s knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.”

Really?  If the above is true, the only good reason is if he consents.
I spy on my husbands work phone and whereabouts.  It’s my right to know. Am I going to wait till somthing happens?  HECK no!

Reply

Most likely he knows your Apple ID AND

From Kim Masterson-curci on October 26, 2015 :: 12:15 am

Your Password you have set for it. and he tracks You through the find my iPhone app he can put on his phone even if it’s not an iPhone.  He just signs in like he is you and goes to the find my iPhone app and he can view currently where you are.  Also be aware that since he can view your location by way of your phone he can also read your email, check out all your contacts, read your notes. Etc etc etc…..
You need to back up your data on phone to your computer .  Wipe your phone clean. And start fresh. Fresh phone, fresh life then reset it and use a Brand new Apple ID the boyfriend doesn’t know you have and get yourself a hard password or two step verification.  I bet that takes care of that. Of course you can be tracked by a lot of other things as well. If you want to be safe turn off all location tracking in settings. Only turn it on if you need to look at a map then turn it off.

Reply

gravatar

Try this, it worked for me

From Tom on October 29, 2015 :: 12:39 pm

Just wanted to leave a comment about a tool I used to scan my iPhone recently. Its called Certo iPhone and claims to detect jailbreak and spyware.  It’s not free but well worth it in my opinion.

Reply

gravatar

give a correct solution..

From jayanthi on November 01, 2015 :: 2:39 am

I made a call to my friend.Third person voice was heard by me while we are taking via mobile phone.Another day same problem arises. But both me and my friend did not make hold or conference call like that.How can I identify the third
person ? or how can I save my voice call with others? Please reply the solution of my problem as soon as possible.

Reply

phone hacked via imei

From Martin Sephton on November 25, 2015 :: 2:32 am

Can anyone tell me how it is possible for someone to keep gaining access to my mobile number via my imei number of my phone when i was being harrassed the harrassment was reported to the police and dealt with but for curious purposes how is it possible for someone to find out my number when I had changed it numerous times by getting several new SIM cards to avoid the person which went to no avail.

Help would be hugely appreciated if ppssible

Thanks

Reply

gravatar

Help

From Person.1 on November 29, 2015 :: 8:48 am

I have a problem. My little sister got a weird message from her friend with spam. Her friend sayd that she didnt send it. After she got that message her phone started acting weird. I managed to put the phone on safe mode and it stopped, but im still a bit worried.

Reply

gravatar

My wife and I have

From Francis on November 29, 2015 :: 3:00 pm

My wife and I have been being stalked for about 3 years now by someone who gets our text msgs, sees call logs and emails etc.  They text and call our phones and friends phones from the same number.  Is there a way to find out who it is? They are using a pinger number or some other fake number website. We have been to the police filed the reports but have been told nothing can be done about it.  Any suggestions.  I have looked and see now spyware on either phone

Reply

gravatar

worst family, and city in the world

From andria thompson on December 03, 2015 :: 2:33 pm

My family is the worse family anyone can ever have.  My sister and my mother kidnapped my children and they expect ransom money from me and I don’t have it.  I was in California minding my own business when people there started saying some of the same things that my ex co-workers used to harass me about when I was working for that company.  I opened a sexual harassment case against so many of them:  Eric Millner, Anthony Beaucamp, Christy Scoggins, Matt, Brian Parks, Tonya Davy, etc. and now my sister (Antronette Malone) is involved.  For all I know she helped falsify the documents and forge the signatures.  I kept saying things about it via the internet media sights and then they plotted against me and took my children away because they wouldn’t even allow me to access my unemployment account to even be able to apply.  Kelly at the unemployment office lied and said the unemployment office denied my claim and I hadn’t even applied yet.  I have my evidence, but if I present it they will keep my children as ransom and I’m afraid for them.  I don’t want them hurt.  I’ve never had my children away from me for any length of time but due to this.  And you know my stupid mammy even helped and she never even gave me a chance to explain my sides of the story.  I hate them.  they lie all the time and I always find them credible, but no that’s how these tramps are, they always believe someone over me and then waited til I moved to try and help hack my shit.  I say that if the FBI does through your asses in jail along with the rest of them, good, because I don’t understand how you can hate the way you do and then expect me to come back and feel like you have my best interest at heart- you don’t and I never want to see your asses ever again.  If you’re looking for money I don’t have it.  I also called the Amber alert- national line to report my children kidnapped and they wouldn’t even take the case, I guess as usual black children don’t matter.  I guess when have to make room for the Sarahs and the Suzys and Billys and Micheals in this world.  I can’t give you any money, so they I guess will keep my children until I can pay up, what? I don’t know.  This situation is happening in Louisville, Kentucky as we speak.  Please send help if you have the man power to put these hackers to bed and get the FBI on their cases.

Reply

gravatar

hacked or cloned

From Karen Roush on December 16, 2015 :: 10:32 pm

I recently moved out of an abusive home my husband and son cloned or hacked my phone and tablet so they can watch my every move I’m in danger please help

Reply

gravatar

Hacker for hire

From Charlene Beckett on December 17, 2015 :: 9:49 pm

Are you in desperate need of hackers for hire? Do you need to keep a watchful eye on your spouse by gaining access to their emails, even constant updates on thier geo-location? As a parent it would help to know what your kids are up to on a daily basis on social networks ( which includes facebook, twitter , instagram, whatsapp, WeChat and others to make sure they’re not getting into trouble or up to anything mischievous? Whatever services you may require legal or illegal, Ranging from Bank Jobs, Flipping cash, Criminal records, DMV,  Taxes, if you are looking to get any hack espionage accomplished . need funds urgently ? need your grades changed ? thorough background check or Just Name it, We can guarantee to get the job done. We’re a group of professional hackers with 25 Years+ experience. Contact .(JavaScript must be enabled to view this email address) or text +1 813 379 2141.. Send an email and you are guaranteed a solution to whatever problem you have Its that easy,Do try us out today.

Reply

gravatar

I am not able to

From Manu on December 20, 2015 :: 10:32 am

I am not able to change my iCloud password or my email address to which verifying questions hints are send…what should I do ??i need my privacy please help

Reply

gravatar

been hacked by my ex

From David pledger on December 20, 2015 :: 10:50 pm

How do I stop her from being able to read all my stuff and she goes and rubs it in my face she can see all my email and all my bank information and I don’t no how to make it so she can’t do this she says all u got to have is someone telephone number and u can do whatever u want to me this needs to stop can anyone please help me

Reply

avatar

There's more to it than that

From Josh Kirschner on December 21, 2015 :: 3:20 pm

As I’ve said in past posts, I have yet to see any way of hacking a cell phone with just a phone number. That said, if you know someone’s number, it makes it easier to gain access to their accounts via social engineering means (i.e., tricking you into giving it up). Here is one example explained: http://thehackernews.com/2015/06/how-to-hack-email-account.html.

The best advice is to follow our tips for what to do when your email has beens hacked to ensure your ex doesn’t have access to your accounts: https://www.techlicious.com/tip/what-to-do-when-your-email-gets-hacked/.

Reply

gravatar

What is this. ..

From Lora on December 22, 2015 :: 8:41 am

Hi,hopefully you can offer some insight.recently purchased a Samsung galaxy mobile from Walmart.com, prepaid no contact service.  I always check app permissions,  but these apps are pre-installed and can’t be uninstalled, they restart after I force stop them too. The calculator app has ALL permissions granted, andinfo says .secretcodeIME. also lots of strange unknown apps, (silentlogging, run sysscope, tcpdumpservice) are these all normal?

Reply

gravatar

I have pre-installed apps on

From Anonymous on December 22, 2015 :: 8:49 am

I have pre-installed apps on my Samsung galaxy device im concerned about,  mainly the calculator app that has all permissions allowed and info says android.secretcodeIME..can’t uninstall. Is this normal?  Other odd apps too. (Tcpdumpservice, silent logging, mirror) what are these, they sound malicious

Reply

gravatar

Hello can anyone tell me

From James on January 03, 2016 :: 4:39 am

Hello can anyone tell me how I can tell if my wife is looking at my Web searches I am on a plan with her with att and have a galaxy tab4

Reply

gravatar

Abusiness ex

From V on January 16, 2016 :: 7:47 am

Hi,

I recently got rid of a tech nerd boyfriend who was rather abusive and controlling, he was very knowledgeable about phones and what not, esp androids. I have a note 4 and believe he as installed a Spyware on it while I was asleep. Please help, I am lightweight afraid for my safety.

Reply

gravatar

Government can turn your phone remotely and you spy

From zeybaharsyah on January 23, 2016 :: 5:37 pm

http://womenneedtoknow.com In a recent interview that NBC had with Edward Snowden came out some interesting facts about mobile phones. Even when it’s off, you are not safe from the spying practices of governments.

We are gradually all be aware that telephone calls are monitored and that the content of e-mail and social media activities are widely collected by government agencies.
Most probably still be in the illusion that as long as you do not use your cell phone may happen much. Nothing could be further from the truth, according to Edward Snowden.
The US government has the ability to activate a mobile phone remotely and secretly turn on the microphone and the camera of the device.
It’s not just the US intelligence that can do this, but also the Russian, Chinese and any other service in the world that has access to a decent budget to purchase the necessary technical hardware and software.
Once you turn on your phone it is ‘them’. They can listen through the microphone on the camera and can take pictures of you and see what you’re doing via the built-in camera in the phone.
Now it’s not that they do this standard at all. It is based on suspicions they have with certain people, but they can do it on your phone if they so wished.
It goes a step further. If you think you’re safe with your phone does not turn on, forget it. According to Edward Snowden, they can even turn on a cell phone turned off. Just as apps on your phone and you can turn history into Google to search.
The only thing they have not remotely can replace the battery if you took it out of your device. That is the only sure method if you want to make sure you can not be spied on via your mobile phone.
Meanwhile, Edward Snowden is still stuck in Russia and he refuted accusations that he meanwhile, the Russians would work. “I have no relationship with the Russian government. I’ve never met the Russian president. I get no money from the Russian government. But, what really matters is that I am not a spy. “
“It was never my intention to end in Russia.” The reason he never has flown to Cuba to continue from there goes to South America because the US for this flight canceled his passport.
He says he would like to return to his homeland because he misses his family and friends and even, believe it or not, his old job.
John Kerry, the lying American Foreign Minister, this week proclaimed prankster of the week. He called Snowden last week a fugitive and called him to be a guy and come back to America, because he said, “If he cares so much for America and believes in America, he must also have confidence in the US justice system. ”

Reply

gravatar

help

From sarah on January 30, 2016 :: 11:08 pm

okay so i got this text message from some random number sending me a phone tracker app link, but i never clicked the link, and i asked who it was, and how did they get my number… and ever since then my phone has been acting weird like someone is watching it, is that possible? even tho i didnt click the link.

Reply

gravatar

how to track down a tracker

From carly on March 12, 2016 :: 7:43 pm

I need help… I am almost certain with the three months of research I have done, that I am being tracked/monitored on my cell phone. Unfortunately I can not get a new one, but really just want to know how I can track down and prove who the culprit is!!!
Yes I have reset it… but they have access due to the fact that he is my boyfriend. I do not want to set off any alarms till I have that one piece of undeniable proof. I am so close but just need to know exactly how I can trace it back to his phone or laptop. I think it has something to do with using a USB to connect one another via our shared WiFi network…. but… again…. thats why I’m here!!! Please help!!! I have become savvy enough to dig deeper than the regular person…. just not enough to catch him/ red handed.

Reply

gravatar

Hi, I have a question.

From Christie on March 18, 2016 :: 5:38 pm

Hi, I have a question. I bought a flip phone and I pay month to month with Wind. I read in one of your earlier comments that someone could hack your phone if they find out your phone carrier’s web portal. Where is that information located? Would it be in the papers they give you after you purchase your phone, concerning your plan? And is it possible for my flip phone (on a month to month plan) to be hacked? Thank you very much in advance.

Reply

gravatar

IMED the info on the box your phone came in

From Kim on June 28, 2016 :: 1:08 pm

We buy new phones and we think nothing of the package it came in. We toss it in the closet, a drawer the trash whatever. But there’s some valuable info there right in the box.  With the info on box and then knowing it’s a sprint or Verizon phone whichever they go online and can see who you call and even your messages and with the IMED they can clone your phone. For me it was that I texted more than talked on phone and my minutes on voice calls were very high. Also keep track of your data.  You’ll notice a lot of data use not yours.  You can go into setting and set your phone to not down load any third party apps. Also set your phone to not have apps working in the background. There’s an app that lets you take a picture of anyone trying to get into your phone.  Oh you can also go into settings and look at your web site your phones visited. There’s clues in that. Also see what’s used the most of your battery up.  Then WALK INTO THE CELL PHONE STORE AND TALK DIRECTLY TO THE MANAGER OF THE STORE AND TELL THEM YOU WANT A DIFFERENT phone!!  Virus and malware comes in emails and texts and bad websites. I got one from an email from my bank that wasn’t my bank. Looked just like it was from my bank. I had to get a brand new phone. Just be careful who you accept email and text messages from.  It’s creepy what technology can do these days. If you can imagine it then it’s out there.

Reply

gravatar

Can he hack both my whatsapp and Imo account?

From Bernice Atefa on March 20, 2016 :: 8:32 am

My boyfriend is hacking my whatsapp account and he sees all that I do. I told him I also want to hack him so that i can also see what he does but he said I can’t hack him even if he showed how he did it because am in another country. My problem is, can he also hack my IMO account with what ever hackingtool he is using to hack my whatsapp? If he is indeed hacking my IMO, den how can I secure the account?

Reply

gravatar

Sim Card

From shelly on March 20, 2016 :: 3:46 pm

my ex told me he had to use the upgrade on my phone so he could get a new one. he also said he had to use my sim card number, which the sim card is in my phone. is this possible, and if so, what information from my phone does he have access to with my sc number. also, i had a voice mail on my phone but could not retrieve it because it kept saying i was entering the wrong pin

Reply

gravatar

Help!

From Marie on April 06, 2016 :: 12:15 pm

So I recently had someone text me and tell me to call this number: 714 707 3260 to get a verification code for them and text the code to them. I thought I was helping at the time so i did because this person said it was through their work company. After doing so, however, I looked up the website and I am now concerned that someone could get personal information from me. Any suggestions?

Reply

avatar

Yes, that could be a real problem

From Josh Kirschner on May 04, 2016 :: 9:19 am

The number seems to be from an account verification service that “may” be used by LinkedIn, Microsoft and others for two factor identification of account changes. However, no one should be texting you to ask you for this code. If you haven’t already, I would suggest changing your login info for your email, Facebook and other main social accounts. And follow these steps for what to do when your email has been hacked, just in case: https://www.techlicious.com/tip/what-to-do-when-your-email-gets-hacked/

Reply

TI'm in the same position

From Kelly Babela on April 08, 2016 :: 1:24 pm

TI’m in the same position chick the other day in front of my house I picked up my boyfriend’s phone call on his Bluetooth that he was having with some other woman now he wasn’t even on his phone he didn’t have in his hand I don’t see any earpiece and I don’t know how he’s doing it but I know now for a fact I’m not crazy and he is doing it so if you have any suggestions on how I could figure this one out I’ll try to help you with yours

Reply

the other day someone pulled

From Kelly Babela on April 08, 2016 :: 1:26 pm

the other day someone pulled up in front of my house and it picked up my boyfriend’s phone call with their Bluetooth he was having someone else..no he didn’t have his phone or an earpiece so I don’t know how he was doing it maybe you might have a suggestion

Reply

gravatar

scared

From chai on April 20, 2016 :: 2:00 am

My family gave me a cell phone. I was aware they may be tracking me but now I am afraid they can listen to my calls. I have said some incriminating things.

Reply

gravatar

Hey does the laucass get erased when factory reset?

From Vanessa on June 01, 2016 :: 7:00 pm

So I’m just wondering, does the app like attach itself to your email or the hard drive on your phone? Can it really be 100% removed by a factory reset? I’ve been thinking my phone is spied on and I’ve factory reset it but I still feel like my messages are read, and my Google Search is being spied on too.how do I remove it or any other spy app 100%never to return unless they have my phone again?

Reply

gravatar

Cloned?

From Babygirl on June 17, 2016 :: 7:06 pm

I know my phone has been compromised. To what extent, idk. The evidence of “something” is overwhelming! My first question is what about my sim card? Micro chip? Phone number? Will rooting the phone fix the issue(s)? AND MORE IMPORTANTLY!!! Can I catch the SOB(S)?!...

Reply

gravatar

Scared!!!

From Marie on June 23, 2016 :: 6:51 am

English isn’t my first language, and I’m sorry for mistakes.
Lately, I’ve experienced many strange things on my Mac and my phone as well. According to the login history on my Mac, it looks like someone has been using it without my permission 4 times in the past 3 months. I don’t know how they did it because my Mac is always in my bedroom, and I never use it elsewhere at my college (I’m 20 btw). That’s why I wonder if someone could be spying on my Mac. The webcam has turned on by itself twice, and my colleagues know things I only have mentioned on the internet and on my phone during conversations. My phone makes weird noises when I’m not using it, and sometimes I hear beeping sound when I make a call.
I don’t dare to tell anyone about this because I fear others think I’m insane. What should I do?

Reply

avatar

Have you followed our recommendations above?

From Josh Kirschner on June 23, 2016 :: 9:54 am

The first thing to do is check if your iPhone is jailbroken using a security app like Lookout Security? If your phone isn’t jailbroken, it’s highly unlikely someone is using it to spy on you.

For your Mac, have you run a malware check? If so, what program did you use? You can find our recommended Mac security products here: https://www.techlicious.com/guide/best-free-paid-mac-security-software/.

Reply

gravatar

Yes

From Marie on June 25, 2016 :: 11:35 am

Hi! I’ve tried to scan my Mac using Avast and Malwarebytes, but they can’t detect anything suspicious. Is it possible to monitor a computer via the internet? Thanks in advance!

Reply

avatar

depends what you mean by monitor

From Josh Kirschner on June 27, 2016 :: 12:31 pm

If you there is no malware on your computer, than no one will be able to monitor your computer via the Internet. However, if they had access to your email password, iCloud login, etc., there are a lot of ways to monitor activities that don’t require access to your Mac. It’s also possible if you are using a public WiFi network that people could be monitoring your activity via a network sniffer. They wouldn’t be able to see any information from secure (https) connections, but general browsing and search might be visible.

gravatar

Keylogger

From Marie on June 27, 2016 :: 3:24 pm

Thanks for your reply! What about a keylogger? Is it possible to install one remotely or via a server on the internet?

Reply

avatar

Yes, possible to install remotrely

From Josh Kirschner on June 27, 2016 :: 6:20 pm

Yes, there are a variety of ways to get infected with keylogger malware remotely. However, that most likely would have been picked up in one of your two malware scans. You can try a third scan with another program, like Sophos, if you want to do an additional check.

Reply

gravatar

Today I decided to scan

From Marie on June 28, 2016 :: 4:05 pm

Today I decided to scan my Mac with Sophos, but it couldn’t detect anything either. Is it possible to create a keylogger that looks like a legitimate file? If yes, would that file be able to hide in the background and be unnoticed during a scan?

Reply

avatar

Scans should find it.

From Josh Kirschner on June 29, 2016 :: 10:54 am

Many malware programs are designed to look like legitimate applications. However, antimalware programs are specifically designed to find the software signatures of these programs. So if the keylogger is in the antimalware database, it should be found.

You could always do a complete system reinstall on your Mac, which would remove any malware, but that seems like overkill unless you have strong reason to believe there is actually malware on there. Given you’ve run scans with three different programs, I would doubt that to be the case.

Reply

gravatar

Weird file

From Marie on July 01, 2016 :: 4:06 pm

I’ve considered doing a complete system restore because I just found a weird file on my Mac, and I took some screenshots of it.

Attached is a screenshot of the ‘mysterious’ file:

http://i65.tinypic.com/x22m2v.png

I’ve never seen such file before, and I don’t know what it is.

Reply

gravatar

Weird file

From Marie on July 01, 2016 :: 4:16 pm

.....and here’s another screenshot:

http://i67.tinypic.com/2nte1ol.png

avatar

What's the name of the file?

From Josh Kirschner on July 05, 2016 :: 10:30 am

It’s hard to tell what that is from your screenshot. Can you tell me the name of the file and what directory it’s in?

iPhone sounds

From Dan Deez on July 03, 2016 :: 4:47 pm

It sounds like the “sound” played after going into **FindMyIphone** 
Your devices are listed and you have 3 options
One of which is to “play a sound” when phone connects to Internet , so each time you turn it on….
you connect and the notification comes through
it gives your phones location too??!!

Reply

gravatar

XML document

From Marie on July 05, 2016 :: 11:39 am

It is an XML document and it’s located at my archive directory.

Reply

avatar

What's the name of the file?

From Josh Kirschner on July 05, 2016 :: 12:43 pm

And is it in your main archive directory or a subdirectory?

Reply

gravatar

It is in my main

From Marie on July 06, 2016 :: 6:44 am

It is in my main archive directory. The file is called wf.xml

Reply

I have a I phone

From Sturgis Turton on July 05, 2016 :: 2:08 pm

I have a I phone 5 and my fiancé has a galaxy s4 when u go to her contacts and click on my name it has linked Google and Microsoft accounts what does. This mean and I discovered on face book in apps notifications there were friends watcher and friend latitude finder , na mobile vault , blackberry smartphones app, And other things I didn’t put there and they were all set to setting only me can see what does this mean

Reply

gravatar

TMOBILE Notification that SIM Card Changed

From Ing on July 14, 2016 :: 6:22 am

I recently contacted TMOBILE in order to make some changes to a prepay account.  After they verified the account my call got dropped and a message flashed on my phone (operating system message?) stating my SIM card changed.

When I again spoke to TMOBILE they assured me no changes had been made to my account.

Not comfortable with this at all…please comment.

Thank you so much!

Reply

avatar

Sounds like T-Mobile

From Josh Kirschner on July 14, 2016 :: 9:44 am

Given the timing, it definitely sounds like something T-Mobile did.

Reply

gravatar

Name: Cindy ZavalaState: CaliforniaCity: OxnardZipcode:

From nicole kniffen on July 18, 2016 :: 7:18 pm

Name: Cindy Zavala
State: California
City: Oxnard
Zipcode: 93035

Reply

Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Newsletter Archive
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.

site design: Juxtaprose