Tech Made Simple

Hot Topics: How to Fix Bluetooth Problems | Quell Pain Relief Review | Browse the Web Anonymously | Complete Guide to Facebook Privacy

Use It

author photo

Is Someone Spying on Your Phone?

by on March 30, 2012
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 691 comments

[Editor's note 2/9/17: Since this article was written five years ago, many new phone hacking methods have been developed and/or discovered. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see: http://www.zdziarski.com/blog/?p=3820]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.



Discussion loading

gravatar

Keylogger

From Marie on June 27, 2016 :: 3:24 pm

Thanks for your reply! What about a keylogger? Is it possible to install one remotely or via a server on the internet?

Reply

avatar

Yes, possible to install remotrely

From Josh Kirschner on June 27, 2016 :: 6:20 pm

Yes, there are a variety of ways to get infected with keylogger malware remotely. However, that most likely would have been picked up in one of your two malware scans. You can try a third scan with another program, like Sophos, if you want to do an additional check.

Reply

gravatar

Today I decided to scan

From Marie on June 28, 2016 :: 4:05 pm

Today I decided to scan my Mac with Sophos, but it couldn’t detect anything either. Is it possible to create a keylogger that looks like a legitimate file? If yes, would that file be able to hide in the background and be unnoticed during a scan?

Reply

avatar

Scans should find it.

From Josh Kirschner on June 29, 2016 :: 10:54 am

Many malware programs are designed to look like legitimate applications. However, antimalware programs are specifically designed to find the software signatures of these programs. So if the keylogger is in the antimalware database, it should be found.

You could always do a complete system reinstall on your Mac, which would remove any malware, but that seems like overkill unless you have strong reason to believe there is actually malware on there. Given you’ve run scans with three different programs, I would doubt that to be the case.

Reply

gravatar

Weird file

From Marie on July 01, 2016 :: 4:06 pm

I’ve considered doing a complete system restore because I just found a weird file on my Mac, and I took some screenshots of it.

Attached is a screenshot of the ‘mysterious’ file:

http://i65.tinypic.com/x22m2v.png

I’ve never seen such file before, and I don’t know what it is.

Reply

gravatar

Weird file

From Marie on July 01, 2016 :: 4:16 pm

.....and here’s another screenshot:

http://i67.tinypic.com/2nte1ol.png

avatar

What's the name of the file?

From Josh Kirschner on July 05, 2016 :: 10:30 am

It’s hard to tell what that is from your screenshot. Can you tell me the name of the file and what directory it’s in?

iPhone sounds

From Dan Deez on July 03, 2016 :: 4:47 pm

It sounds like the “sound” played after going into **FindMyIphone** 
Your devices are listed and you have 3 options
One of which is to “play a sound” when phone connects to Internet , so each time you turn it on….
you connect and the notification comes through
it gives your phones location too??!!

Reply

gravatar

XML document

From Marie on July 05, 2016 :: 11:39 am

It is an XML document and it’s located at my archive directory.

Reply

avatar

What's the name of the file?

From Josh Kirschner on July 05, 2016 :: 12:43 pm

And is it in your main archive directory or a subdirectory?

Reply

gravatar

It is in my main

From Marie on July 06, 2016 :: 6:44 am

It is in my main archive directory. The file is called wf.xml

Reply

I have a I phone

From Sturgis Turton on July 05, 2016 :: 2:08 pm

I have a I phone 5 and my fiancĂ© has a galaxy s4 when u go to her contacts and click on my name it has linked Google and Microsoft accounts what does. This mean and I discovered on face book in apps notifications there were friends watcher and friend latitude finder , na mobile vault , blackberry smartphones app, And other things I didn’t put there and they were all set to setting only me can see what does this mean

Reply

gravatar

TMOBILE Notification that SIM Card Changed

From Ing on July 14, 2016 :: 6:22 am

I recently contacted TMOBILE in order to make some changes to a prepay account.  After they verified the account my call got dropped and a message flashed on my phone (operating system message?) stating my SIM card changed.

When I again spoke to TMOBILE they assured me no changes had been made to my account.

Not comfortable with this at all…please comment.

Thank you so much!

Reply

avatar

Sounds like T-Mobile

From Josh Kirschner on July 14, 2016 :: 9:44 am

Given the timing, it definitely sounds like something T-Mobile did.

Reply

gravatar

Name: Cindy ZavalaState: CaliforniaCity: OxnardZipcode:

From nicole kniffen on July 18, 2016 :: 7:18 pm

Name: Cindy Zavala
State: California
City: Oxnard
Zipcode: 93035

Reply

gravatar

locate who is spying on me

From ronnie on July 22, 2016 :: 5:22 pm

100% positive someone is spying on my phone. how do i find out who?

Reply

avatar

How are you 100% positive?

From Josh Kirschner on July 25, 2016 :: 11:04 am

Why do you think it is you phone that is being spied on? If it is, chances are that it is someone who had direct access to the device. But it is very difficult if not impossible to determine who it is without significant law enforcement involvement (which is unlikely to happen).

Reply

gravatar

Cheating spouse

From Tammy on September 02, 2016 :: 9:36 am

I will be running a clone on another phone and I will get it sent to you so as the target gets new texts or phone calls or whatsapp messages on the phone you get to know how it is and what the message is. I’m gonna install a software on the phone which will allow you access the archive of the deleted messages of the last 6 months as well. I have series of hacks to process, I am a busy person. Get back to me ASAP if you’re ready to do this.

Reply

gravatar

Parental control husband?

From Mary on December 11, 2016 :: 2:38 pm

Dude is controlling my iPhone

Reply

gravatar

Been hacked

From Frances on September 04, 2016 :: 2:30 pm

My phone apparently had been hacked. Now I’m trying to see where the hacker is or who it is. They set me up and now my boyfriend thinks I was tracking him. Somehow when I call him it says I’m locating him by “pinging” his phone. Ive never downloaded anything to do that or ever needed or wanted to do that. How does this happen?

Reply

gravatar

why

From suicidal on September 04, 2016 :: 9:17 pm

Why are these people doing this? Because you all suck at being parents and raised a bunch of animals that have nothing better to do than torment one another.  You want to solve these hacking problems? STOP raising kids to depend on technology make them socialize normally, keep companies from doing business digitally, demand that you want to do business one on one paper and pen and keep the tools that allow people to commit evil no longer an option.  We are allowing our society to become detached and too synthetic , before long the science fiction of people living digitally will be reality, we are getting closer all the time and the benefits don’t outweigh the cons, but because it’s easy to live a fake life online and do things without really living and working we make it easy for people who haven’t developed social skills to thrive and exist comfortably in this new age and sadly it’s too easy to do wrong to others and not feel any negative way about it because you’ve raised your kids to be desensitized to reality, to pain, grief, war, and even love. 
Your life has been hacked, too late to fix it. You can try but your time is better spent living well with what you have, not letting the people have control of your life joy and freedom remaining , do not dwell in misery of it. Fight for your freedom by enjoying life and not living in fear. Prepare and protect yourself from further damage but letting it consume you is giving them the power and provoking them to continue.  Ignore evil don’t give in to it. If you think you can destroy it, try, but don’t make it a choice that consumes your life or some vendetta, it will only antagonize them to do more. And for God sake teach others and the youth right and wrong people, just because technology makes it easy to raise kids without the same interaction doesn’t make it right. Like this pokemon go garbage, just no. Stop. Grow up. Just because everyone’s doing it doesn’t mean you should. Until we tell the world and each other that technology is taking too much control of our lives and let it walk all over us be cause of a few simple comforts it provides, it will only get worse.  If I see a kid walking around playing pokemon or catch them hacking a phone, you better pray it’s not your kid, cause I’m taking their phone and smashing it. You can buy them a walkie talkie, they shouldn’t be too far from you anyway.

Reply

gravatar

phone hacked by nine people.

From cathy hale on September 05, 2016 :: 10:37 am

I can’t get help called fb customer service talked to richard brown. Very rude, thick accent and talked fast. Said in order to secure my acct the cut $200.00 per person. This I can’t believe. I have begged a cust service rep to call me. They refuse. I need names of hackers and if they stole money from our bank acct we want b able to pick it out. I would like to speak to the highest Corp manager to get some help. Every rep I talk to has strong accent, they talk very fast and show no concern how an innocent person can b so upset. My ph # is 9034229832. As soon as Richard Brown at 1 347 1109 as soon as I told him I couldn’t come up with money at this time. Plus I need to verify that you indeed charge a fee. First he said that many then dropped tp$350. The tech he trnfd me to called back twice with unknown #. Have had the worst experience with this in my whole life. Face book is not a good example for fb. Rude and u can tell they just want to get u off ph.they want customers to do all leg work. Many of us can’t. I asked for a call back.  No reply.the tech name is Jeffery Davis. He’s the one that called me back on an unknown #  Richard has my debit card info can u delete and give me a confirmation code. Ur staff is not reperable. I worked over 30 yrs over cust service. If one of my people talked to a customer the way I was treated. I would have let them go. My phone # is 9034229832 add 1020 s Perry denison tx 75020. Pls call me back and try to restore my faith in you as fb. We need the help desperately. Ur reps act like it’s a. Bother to answer our questions. So turned off by their behavior. They need to think of innocent people that the hacker got us. Very truly yours Cathy Hale

Reply

gravatar

My phone has been acting

From J on September 12, 2016 :: 10:42 pm

My phone has been acting very strange… i think maybe one of my friends is messing with me…..

my phone will randomly say things….
yesterday it said ‘‘suck my dick’‘’
HOW is this happening… i cant find anything with a google search to make someones phone say stuff…

Reply

gravatar

Am I be tracked?

From unknown on September 15, 2016 :: 11:05 pm

I got a creepy call from a guy at work. He called my work’s phone from an “unknown number” He then described me and asked to talk to me. He put on a big show saying he works with my boss and that my boss told him about me being a good candidate for a manager position. He then told me to call my coworker off of my personal cell phone while I was on the work phone with him. He told me to put it on speaker and keep it close to the phone I was talking to him on so that he could hear. He wanted to walk me through what to say to my coworker. I didn’t think anything of it until after. I checked and saw that he had called the store phone from an unknown number. Is it possible that he could have somehow been able to track my personal phone since I was holding it close to the phone I was talking to him on? This may be a ridiculous question, but technology is so advanced these days that it could be possible for all I know. Please respond fast. Whoever this creep is has chosen the wrong person to mess with and I plan on being 5 steps ahead of him for whatever he is planning.

Reply

gravatar

How is he doing it?

From Kiki on September 18, 2016 :: 6:26 pm

I can usually look on Verizon usage and see who my husband has been in contact with. However, we are now separated due to me suspecting an affair. I can always see his usage during the week but somehow on the weekends all of his activity is not on there. It’s only weekend activity and only for his phone. Everybody else’s shows up on the weekends. We all have iPhones. Are there any programs available to track his texts, messages, emails, and gps locations in order to prove an affair? He also has a second cell phone that I found out about accidentally. We have 6 children. I’m a stay at home mom. If we divorce I get very little and no alimony unless I can prove there is infidelity. Please help!

Reply

gravatar

4 years of being hacked and terrorized

From Lynda on October 10, 2016 :: 9:43 am

In 2013 my life changed forever.Every phone,laptop,television even our xbox was hacked.I have lost thousands of dollars replacing them.I had lived alone for 7 years and I ran into a guyI have’nt seen in 20 years.He moved in some months later.For next 2 and1/2 years strange things started happening to my email.I had the same one forever then it got to where I had to change it alot.Then it got to where my phones were not working.All my settings would change while I watched,it was crazy.Then my administrators passwords were changed on everything.I couldnt even make a call.Meanwhie,this guy is’nt having any problems with hid and we had the same wifi,same type phones.I just couldnt wrap my mind around it.Then it got to the point,he is saying,you must be messing up your settings and so on.I’am a paralegal,I worked from my home on my laptop years before this happened.He didnt even know you can bluetooth music to each other,etc.I went to the Geek Store and he said if we were on the same wifi,cell plan etc.there was’nt any reason my device’s should’nt work.I went home and told him and he attacked me violently,I did’nt accuse him,because to be honest I could’nt understand why he would do something like that.I moved to another town,got all new everything again.And I didnt even activate my phone,I put the battery in and it starts ringing right out of the box.Like I said it had been a constant battle to just try and use a phone,any phone.I can’t keep any pictures,videos,contacts etc.And all my emails get re-routed.Facebook hacked and I’ve been trying to get help,but it sounds crazy.About 10 months ago,he found me and kidnapped me at knife point it lasted for over 9 hours he had me drive and I had my seatbelt on,and he beat me as I drove,stabbed me in the neck and side.Finally,got away when he wanted to stop at a store.Everything started working when they arrested him.He is out and everything is a nightmare again.I know he is doing it but don’t know how to prove it.Every app on my phones have full permissions, the check marks are greyed out so I can’t delete any .Also did hard factory reset,and it does’nt help.I found something called com.android.google.gms.persistent and a file that says .nomedia and I cant delete them,I start looking and there are millions of them.I even used a different name,email everything.Then I found a file that had Geo fencing and and then my phone serial number has changed and I have no data and I don’t use it.I had my battery out and wss in the cell store trying to explain it and they got on their computer and it showed my data being used up.And they could’nt even figure it out.So,I ended up losing my 12 year job because of my injuries and lost eveything I have worked for.How can I prove he did this.I have over a thousand notebooks,legal pads full of information but its like he is me and controlling my phone without touching it.Also,I had bluetooth in my SUV and it is hacked and my cameras sd card erased,I have no control I have no hope left.Please help.Thank you.

Reply

gravatar

Lynda, you described exactly what my phone is doing

From Denise on August 28, 2017 :: 2:12 am

Reply to Lynda,
  You described exactly what has been happening to me for over a year now. I’m on my 16th phone, 4 tablets I bought for Christmas are inoperable, as well a 2 laptops. My apps have full permission and then some. I force them closed, turn off draw over and the permission to modify settings. Here’s a shocker, the phone turns the apps back on. I hear the sound of the keys tapping on the phone when I’m not using it. I have been thru about ten emails and list a good job as a result of emails to my job from me required if your going to be out sick or late. The email said sent on my side, however were never received by my job. I was told by my supervisor to go to them for help, only to be forced to go to 8 sessions of counceling and treated like I’m crazy. I have told the people around me only to be treated and called a loon. I don’t like to use my phone for anything because it creeps me out knowing that a whack job is monitoring everything. I have boycotted phones for a few months, and broke down and accepted a phone my boyfriend bought me last week only to find the shittery on it 48 hours in. I have used my daughters phone for about a month in the past, gone to different phone providers and different brands of phones and ironically and amazingly it finds my phone. I suspect it’s is thru my router and I can’t access it after the one time I was able and found something about family plan and my phone being labeled as vulnerable. Before I could change the settings and try to save them the password was already changed. I suspect it is someone close to me or used to be. It started last year with me being followed and run off the road a few times, that stopped and then the phone shittery started. I have seriously been thinking of relocating back to Boston and going ghost for a while. I have some friends willing to help my daughter and I, and have had to leave my phone home and go use friends phones and computers to contact my friends in Boston to set this up. I suspect the person that is doing it and the only response to this B.S. from him is, your a loon and you need help, he is sick of hearing about it, and to go get a f_ing job. It’s almost impossible when my calls and voicemails are intercepted or blocked, numbers and messages from friends get blocked, just about every google app on my phone is locating my every move. The phone can listen to my conversations by just being in my purse, it snaps pictures, videos, etc. I have had to put electrical tape over the lenses on the phone because it’s creepy. My navigation arrow literally turns around and sends me the wrong direction. I have to listen to my boyfriend bitch because I didn’t call or text, however he must not hear me mention the phone won’t let me message or make calls. The do not disturb gets turned on and it schedules itself, I don’t set it, the phone mystericaly has a mind and will of its own. Amazingly my other half is the only one that can always contact me and ironically when the Wi-Fi and plane mode is enabled. He must have the Midas touch and golden fingers. The one thing I pray for every night is that I find out what it is and who did it so I can return the favor of disrupting their life for exactly as long it disrupts mine so they can really understand how it feels to be isolated with no contact or resources to help. I tell the appropriate resources only to be treated like I’m crazy and imagining the crap I have seen my phone doing. I think those appropriate people just don’t have an answer and it’s easier to blow me off!! I don’t have the correct terminology when trying to describe the crap, so it sounds difficult to believe. The guy that keeps saying to do the factory reset to fix this, here’s a news flash, I’ve done them a zillion times, however, in the files in emulated storage there is a pre-load and a ton of crap from getlib,init,bam_demux,cnss_prealloc, ghsic_ctrl, IEEE80211,lmh-monitor, mdss_panel_fb0,msm_ipc_router, msm_ISpo, gpnp-power-on_13,4, smp2p_test, doc:devfreq_spdm_CPU,tracing,mts_mask, surround_sound_3mic, wqeclient,fake-libs, fonts, screen overlays

Reply

gravatar

I think my friend's phones is being tracked by her BF.

From Teekah on November 01, 2016 :: 1:08 pm

She has a Samsung Galaxy and today she got an alert for “lookout” that said she she had some kind of malware. Now her BF has done very shady things before so it is not surprise that he would do such a thing. He is also computer expert. She deiscovered a weird app called “Device” and it has a black box with a white vital sign on it. I tried to google this but I couldn’t find anything. It also has access to her camera, photos and contacts. Do you know what this app is and should she be concern?

Reply

avatar

Hard to answer without more info

From Josh Kirschner on November 03, 2016 :: 12:24 pm

It’s difficult to interpret what you’re finding without more details. However, If she’s getting an alert from Lookout Security, that’s definitely something she should pay attention to. Doesn’t mean it’s malware from her BF, it could have come from a number of places, and it may even be a false alert, but better safe than sorry.

In any regard, protecting your device isn’t particularly hard. Reset your device if necessary, put on a strong lock code and install Lookout Security or antimalware from another major provider. And don’t download attachments in MMS unless you know for sure what they are.

Reply

gravatar

Help is needed, Josh!!!!!!!!!!!!

From Ahmed on November 02, 2016 :: 5:47 pm

Hi Josh,
I have noticed that you haven’t been answering for a while, I hope you would answer me because I really feel helpless and confused.
My partner had recently an access to one of my chats on FB messenger. She claimed that she did so through bypassing my entry password of my laptop. I have some evidence she could be truthful. However, I feel insecure! I read many articles on the internet, including your valuable ones, and I consulted some friends. I am intending to perform some steps. Please, have a look at them and let me know if you have any more suggestions:
-For the cell phone, I will do factory reset which will be followed by restoring all my data through my google account excepts the apps which I will reinstall manually, download the antispymoobile, in addition to Avg premium version and 360 security, apps, change the entry password and make it stronger (in addition to the chat messenger locker offered by 360 security app), and install the app notifier to let me know if someone wants to install any suspicious files in the future. Some questions in this context:
....I am unable to synchronize my contacts to the google account, what should I do? Any other ways to backup my data? how can I make sure that my data were safely backed up before I do the reset? does the google account backup any other data apart from the contacts, photos, and videos?
....Do I need to use any of the cell phone password locker apps?

-For my laptop, I installed the Malwarebytes and I ran it which revealed a huge number of suspicious files which I quarantined all. I would also change the entry password. In the near future, I would change all the passwords for all the websites and apps. I would also adjust the settings of my browser into not to remember the history or the passwords.
should I still be worried about the fact that she could installed any of the spying files on my laptop? and what should I do for this?

- Is there any potential harm or any measures I should take regarding my wireless network (which she is sharing and I am adjusting my network settings as if it is public), Bluetooth, or SIM or SD cards of the mobile?

-What should I do regarding the bypassing of the passwords for the laptop or the mobile? Pretty concerning matter!

-What is your opinion in using any of the password manager apps (e.g. sticky passwords), is it safer?

Thanks and sorry for the many questions!

Reply

avatar

I'm still here!

From Josh Kirschner on November 03, 2016 :: 12:11 pm

This article has obviously been around for a while and technology continues to change, so it’s due for an update. But let me give you my current recommendations.

For your phone, if you suspect she may have had access and installed malicious apps on your device, a factory reset is a good idea. However, any of our recommended mobile security programs should be able to detect spyware and remove it. I would suggest Lookout Security as a free option. AVG didn’t perform very well in my 2013 test, though I haven’t retested. I am not at all familiar with 360 Security. I would also not install App Notifier as it really isn’t necessary anymore (you’ll see any app installs in your notification bar) and I’m cautious about apps from unknown third-parties that have that level of control over your device.

Not sure why you can’t back up your contacts to Google, as that would obviously be the easiest way. You can also export them to your SIM card or an SD card in your Contacts menu and then re-import them after you reset. If you go into your phone Settings menu, then Accounts and select your Google account, you can see your sync settings to see what is being backed-up and what is not.

You shouldn’t need a cell phone password locker if you have secure screen lock on your device, but it wouldn’t hurt if you want to be extra careful (our recommendations: https://www.techlicious.com/guide/best-password-managers/). And the password manager can sync with your PC, giving you extra protection on both devices (and generally a good idea for ensuring you use strong passwords on the web).

For your laptop, I would also run Herdprotect (http://www.herdprotect.com/). Similar to MB, free to run scan and very thorough. Of course you need something to provide ongoing antimalware protection (our recommendations: https://www.techlicious.com/guide/best-windows-mac-antivirus-security-software/). And put a lock screen password on your laptop. If you want to go a step further, you can encrypt your hard drive using Bitlocker so it can’t be read without the right password. Depending on what version of Windows you’re running, you may need to upgrade to run Bitlocker. 

Most important communications will be encrypted over your wireless network. So while it is possible for someone on the network to see what sites you visited, they won’t be able to see any of the data sent. It’s possible to spoof sites and trick you into entering login info, but this is not something the average person is going to do.

So that is my tech advice. My non-tech advice is to consider why you’re with a partner that you have so little trust with? At the end of the day, you can only put so many technical protections in place, all of them have potential points of failure, and none of them will replace having a partner you can rely on.

Reply

gravatar

Thanks! More about bitlocking and password bypassing?

From Ahmed on November 03, 2016 :: 4:02 pm

Thanks, Josh!
How can I do bitlocking of the hard device and how can this protect against spying?
How about the bypassing of entry passwords of the laptop (which she did already) and the cellphone?
One more concerning thing: she was able, with the aid of one of her friends, to one-time access my FB profile with only the profile name and phone number. How could this be done and how can be avoided in the future?

Reply

gravatar

Herdprotect or Reason Core security?

From Ahmed on November 03, 2016 :: 4:23 pm

Another thing Josh, while I was trying to download herdprotect, there were three options: hedprotect full, herdprotect portable, and reason core security (recommended. which would one be the targeted one?

Reply

gravatar

Tablet concerns

From Faye on November 19, 2016 :: 1:24 am

Is it possible for someone to know that you removed a photo from a tablet without having physical access to the tablet?

Reply

avatar

It's possible.

From Josh Kirschner on November 21, 2016 :: 4:20 pm

If there is spyware on your tablet that is syncing photos, then that person would be able to see when you deleted one of the photos. Another possibility (and probably more likely) is that you are syncing your tablet photos with an online storage or photo service and that person has access to that account.

Reply

hing i have deleted, mess, and pics too! deletes my google gmail account and changes my paswords so

From Huera DiamondBaby on December 03, 2016 :: 11:06 am

If my ex-bf copied my phone info so that he could encript and monitor my every move! is able lto lock me out my cell phone! upload, and recover anything i have deleted, mess, and pics too! deletes my google gmail account and changes my paswords so i dont have access! locks me out my apps and adds his own apps that hide in mine! he did this without my consent for me knowing but i noticed that i was getting double everything and when i sign in to google i would see devices named windows and linux and my settings would always be changing! i notied weird things shortly after getting! broke up in feb 2016! has gotten worse! is what he is doing legal! he managed to disable my ipad and he added somehow an administrative password on my laptop. had it for a week before i wasnt able to use it anymore ! its almost a 7 months and no o e been going on sin feb 2016! . 1 bought me a

Reply

gravatar

Recieving two mwssage on imo

From Carl on December 06, 2016 :: 11:06 am

I have been spied before, Two days ago, I noticed that everytime I am getting double message on imo. I mean normally, I receive a single text on imo, but now I am receiving the same message twice. am I being spied?

Reply

gravatar

My boyfriend hacked my phone - need help!

From Jessie on December 09, 2016 :: 7:12 pm

I recently found something installed on my iPhone called “TEEN-PC” I can’t find any information for it online. I am sure that my ex-boyfriend installed it onto my phone. He knows where I am, who I am with and has been terrorizing me for months. I want to go to the police - but I have no way to prove it.

Does anyone know about “TEEN-PC” - is there any way to PROVE that he has hacked my phone?

Pleas, I need help. I am living in terror and I need to put an end to this once and for all.

Reply

gravatar

help me please

From Sandra Suarez on December 10, 2016 :: 8:41 am

So I jus got an AT&T go phone with my husband his broke and I took the son out to take care of it until I put in safe place. On well now my phone won’t receive or make calls but my internet.and text messages work fine. Did someone hack my calls to foward them to there phone.

Reply

gravatar

Got ripped off

From Erica Smith on December 22, 2016 :: 6:48 pm

These guys .(JavaScript must be enabled to view this email address) with website http://underworlddwellers.esy.es are big THIEFTSvand SCAMMERS becareful and be cautious. This is the real face ANONYMOUS ripping people off. Here’s their bitcoin address>>>
18GnG153UdYu8R46dLNuFxFCJqRPJTL9SX

Reply

gravatar

Serious question

From Nora on December 26, 2016 :: 5:57 am

Hi.,
I’m just wondering if you’ll be able to answer this question because it is a bit off the topic,, before I went to bed my phone was 88% charged but when I woke up this morning it was 20% charged , can you tell me why this is And if I should get it checked out?

Reply

You must call the Secret

From Laurie Johnson on January 02, 2017 :: 9:57 pm

You must call the Secret Service. They are the ones dealing with this kind of stuff.

Reply

HI

From Eric Kalpakoff on January 03, 2017 :: 9:59 am

Call me 8082094895

Reply

Why do I need to

From Laurie Johnson on February 09, 2017 :: 3:26 pm

Why do I need to call you if you please?

Reply

Tested And Trusted

From Zoe Newbold on January 04, 2017 :: 3:13 am

Hello, i’m an aspiring tech vulnerabiity expert and i’ve found only one hacker to be true so far. His contact is globalview.hacker AT gmail DOT com, i decided to post about him because of how much he enlightened me, impressed me and how i learnt so much from him. If you need any hack done (like upgrading credit score, clearing bad credit report, social media account hack, email account hack, phone hack, fake diploma, various spy hacks e.t.c. ) just contact him at globalview.hacker AT gmail DOT com… tell him i referred you, he’s going to help you.  I just saved you the stress of looking for a hacker. Thank me later

Reply

gravatar

I need your help!!!

From Rmb123 on January 09, 2017 :: 6:30 am

Hello…I worked for a company used my an email address for my work at the company. I left the company almost a year ago, I stop using that email address I don’t even remember it. I did use my regular email address on my work computer at times. My question is…why when I’m filling out ssomething on my phone…autofill pops up up n my boss info

Reply

gravatar

How to proceed

From Jason on January 21, 2017 :: 7:30 pm

Make: Samsung S7
Symptoms: random screen light up, warm battery (new phone)

If I were to guess who may be interested in my phone over the past 6 months it wouldn’t be a jaded lover, and perhaps somebody with a high tech/software background who is beyond just downloading a consumer app.

With that being said, in regards to Stagefright and remote hacking, is there any safeguard for harmful visible and invisible mms messages? I did receive a random photo from an unknown number this past fall and have been suspect of it.

And if there isn’t a safeguard for this kind of attack, is a factory reset even effective? As the attacker could just repeat attack…

Also, do you recommend rooting phones? And customizing? As I have heard this makes it potentially more vulnerable.

I also see you recommend Lookout Security. Would this be helpful in remote attacks. (What would you do in my situation is basically my question!)

Reply

gravatar

With the level of technological

From Riley on January 26, 2017 :: 5:28 am

With the level of technological advancement in the present age, almost everything can now be done with a click of a mouse. Find out if your husband or wife is cheating on you, find out who they talk to when you are not there, hack any mobile phone (call log, text message, whatsapp etc), hack email, educational portal, website, database, increase your credit rating, clear criminal records and many more. You can also protect yourself from hack attacks.You can pretty much get anything you need done with Reputable Hacker. Contact: reputablehacker gmail com

Reply

gravatar

my personal phone number is being used by someone else

From euby dankwa-smith on January 30, 2017 :: 10:08 am

i am happy to discuss this with you

some one has been using my phone to be sending messages to my boyfriend which i honestly did not send.  It was sentences but now it is nude pictures.

i am soo worried. please help.  how do i track the person

Reply

gravatar

I HAVE A BUG, CAMERA,AND

From CRYSTAL WYATT on February 03, 2017 :: 3:38 am

I HAVE A BUG, CAMERA,AND MIC ON ME. THEY ARE TELLING WHAT IAM WEARING, WHAT IAM DOING. ITS IN MY PHONE MY PHONE. I HAVED TRIED ALL KIND OF THINGS.  THE POLICE DIDNT MY BROTHER DID IT TRYING TO MAKE ME LOOK CRAZY. HIM AND MOM HAVE DOING TO ME FOR 7 YEARS. I EVEN SEE PYSCHRIATRIST MONTHLY AND HAS RULED EVERYTHING BUT THE ANXIETY FROM IT AND DEPRESSION. HE WILL NOT TO TELL WHERE ITS AT AND HE WAS THERE WHEN I FOUND THE FIRST ON ME BUT ACTED HE DIDNT DO IT. THE REASON IKNOW HE DID BECAUSE I STARTED CATCHING HE WAS TAKING AND SERIAL NUMBERS, IMEI, NUMBERS, IMEID NUMBERS AND DOWNLOADED ONCE WHEN HE CAME BY. I INSTALLED AN APP CALLED WIRE DETECTION WELL WHEN DISABLED IT. I DIDNT CATCH UNTIL LEFT. U CAN TELL SOMEONE ELSE BY LOOKING MIN NUMBER. IT WILL BE A DIFFERENT NUMBER THAN YOURS SO I THINK. NOW MY BROTHER IS KNOW TO BE FOUND

Reply

Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Newsletter Archive
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.

site design: Juxtaprose