Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | REVIEW: RadMission 1 eBike

author photo

Is Someone Spying on Your Phone?

by on May 28, 2020
in Phones and Mobile, Cell Phones, Tips & How-Tos, Privacy :: 852 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

[Editor's note 5/28/2020: Since this article was written nine years ago, many new phone hacking methods have been developed and/or discovered. In addition, cell phone operating systems have evolved significantly. We've created a new article to cover those various hacks in our new story: How to Tell if Your Phone Has Been Hacked. Please go there for the latest information. We're keeping this story active for the issues and useful advice contained in the comments.]

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for more detail on 9 of the most common spyware programs and how to detect them.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see:]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

(Editor's Note 9/26/12: See our updated recommendations for Android antimalware solutions)

(Editor's Note 8/28/13: See our in-depth study of mobile security apps for our latest recommendations on how to protect yourself.)

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.

Discussion loading

phone hacked by nine people.

From cathy hale on September 05, 2016 :: 10:37 am

I can’t get help called fb customer service talked to richard brown. Very rude, thick accent and talked fast. Said in order to secure my acct the cut $200.00 per person. This I can’t believe. I have begged a cust service rep to call me. They refuse. I need names of hackers and if they stole money from our bank acct we want b able to pick it out. I would like to speak to the highest Corp manager to get some help. Every rep I talk to has strong accent, they talk very fast and show no concern how an innocent person can b so upset. My ph # is 9034229832. As soon as Richard Brown at 1 347 1109 as soon as I told him I couldn’t come up with money at this time. Plus I need to verify that you indeed charge a fee. First he said that many then dropped tp$350. The tech he trnfd me to called back twice with unknown #. Have had the worst experience with this in my whole life. Face book is not a good example for fb. Rude and u can tell they just want to get u off ph.they want customers to do all leg work. Many of us can’t. I asked for a call back.  No reply.the tech name is Jeffery Davis. He’s the one that called me back on an unknown #  Richard has my debit card info can u delete and give me a confirmation code. Ur staff is not reperable. I worked over 30 yrs over cust service. If one of my people talked to a customer the way I was treated. I would have let them go. My phone # is 9034229832 add 1020 s Perry denison tx 75020. Pls call me back and try to restore my faith in you as fb. We need the help desperately. Ur reps act like it’s a. Bother to answer our questions. So turned off by their behavior. They need to think of innocent people that the hacker got us. Very truly yours Cathy Hale


My phone has been acting

From J on September 12, 2016 :: 10:42 pm

My phone has been acting very strange… i think maybe one of my friends is messing with me…..

my phone will randomly say things….
yesterday it said ‘‘suck my dick’‘’
HOW is this happening… i cant find anything with a google search to make someones phone say stuff…


Am I be tracked?

From unknown on September 15, 2016 :: 11:05 pm

I got a creepy call from a guy at work. He called my work’s phone from an “unknown number” He then described me and asked to talk to me. He put on a big show saying he works with my boss and that my boss told him about me being a good candidate for a manager position. He then told me to call my coworker off of my personal cell phone while I was on the work phone with him. He told me to put it on speaker and keep it close to the phone I was talking to him on so that he could hear. He wanted to walk me through what to say to my coworker. I didn’t think anything of it until after. I checked and saw that he had called the store phone from an unknown number. Is it possible that he could have somehow been able to track my personal phone since I was holding it close to the phone I was talking to him on? This may be a ridiculous question, but technology is so advanced these days that it could be possible for all I know. Please respond fast. Whoever this creep is has chosen the wrong person to mess with and I plan on being 5 steps ahead of him for whatever he is planning.


How is he doing it?

From Kiki on September 18, 2016 :: 6:26 pm

I can usually look on Verizon usage and see who my husband has been in contact with. However, we are now separated due to me suspecting an affair. I can always see his usage during the week but somehow on the weekends all of his activity is not on there. It’s only weekend activity and only for his phone. Everybody else’s shows up on the weekends. We all have iPhones. Are there any programs available to track his texts, messages, emails, and gps locations in order to prove an affair? He also has a second cell phone that I found out about accidentally. We have 6 children. I’m a stay at home mom. If we divorce I get very little and no alimony unless I can prove there is infidelity. Please help!


4 years of being hacked and terrorized

From Lynda on October 10, 2016 :: 9:43 am

In 2013 my life changed forever.Every phone,laptop,television even our xbox was hacked.I have lost thousands of dollars replacing them.I had lived alone for 7 years and I ran into a guyI have’nt seen in 20 years.He moved in some months later.For next 2 and1/2 years strange things started happening to my email.I had the same one forever then it got to where I had to change it alot.Then it got to where my phones were not working.All my settings would change while I watched,it was crazy.Then my administrators passwords were changed on everything.I couldnt even make a call.Meanwhie,this guy is’nt having any problems with hid and we had the same wifi,same type phones.I just couldnt wrap my mind around it.Then it got to the point,he is saying,you must be messing up your settings and so on.I’am a paralegal,I worked from my home on my laptop years before this happened.He didnt even know you can bluetooth music to each other,etc.I went to the Geek Store and he said if we were on the same wifi,cell plan etc.there was’nt any reason my device’s should’nt work.I went home and told him and he attacked me violently,I did’nt accuse him,because to be honest I could’nt understand why he would do something like that.I moved to another town,got all new everything again.And I didnt even activate my phone,I put the battery in and it starts ringing right out of the box.Like I said it had been a constant battle to just try and use a phone,any phone.I can’t keep any pictures,videos,contacts etc.And all my emails get re-routed.Facebook hacked and I’ve been trying to get help,but it sounds crazy.About 10 months ago,he found me and kidnapped me at knife point it lasted for over 9 hours he had me drive and I had my seatbelt on,and he beat me as I drove,stabbed me in the neck and side.Finally,got away when he wanted to stop at a store.Everything started working when they arrested him.He is out and everything is a nightmare again.I know he is doing it but don’t know how to prove it.Every app on my phones have full permissions, the check marks are greyed out so I can’t delete any .Also did hard factory reset,and it does’nt help.I found something called and a file that says .nomedia and I cant delete them,I start looking and there are millions of them.I even used a different name,email everything.Then I found a file that had Geo fencing and and then my phone serial number has changed and I have no data and I don’t use it.I had my battery out and wss in the cell store trying to explain it and they got on their computer and it showed my data being used up.And they could’nt even figure it out.So,I ended up losing my 12 year job because of my injuries and lost eveything I have worked for.How can I prove he did this.I have over a thousand notebooks,legal pads full of information but its like he is me and controlling my phone without touching it.Also,I had bluetooth in my SUV and it is hacked and my cameras sd card erased,I have no control I have no hope left.Please help.Thank you.


Lynda, you described exactly what my phone is doing

From Denise on August 28, 2017 :: 2:12 am

Reply to Lynda,
  You described exactly what has been happening to me for over a year now. I’m on my 16th phone, 4 tablets I bought for Christmas are inoperable, as well a 2 laptops. My apps have full permission and then some. I force them closed, turn off draw over and the permission to modify settings. Here’s a shocker, the phone turns the apps back on. I hear the sound of the keys tapping on the phone when I’m not using it. I have been thru about ten emails and list a good job as a result of emails to my job from me required if your going to be out sick or late. The email said sent on my side, however were never received by my job. I was told by my supervisor to go to them for help, only to be forced to go to 8 sessions of counceling and treated like I’m crazy. I have told the people around me only to be treated and called a loon. I don’t like to use my phone for anything because it creeps me out knowing that a whack job is monitoring everything. I have boycotted phones for a few months, and broke down and accepted a phone my boyfriend bought me last week only to find the shittery on it 48 hours in. I have used my daughters phone for about a month in the past, gone to different phone providers and different brands of phones and ironically and amazingly it finds my phone. I suspect it’s is thru my router and I can’t access it after the one time I was able and found something about family plan and my phone being labeled as vulnerable. Before I could change the settings and try to save them the password was already changed. I suspect it is someone close to me or used to be. It started last year with me being followed and run off the road a few times, that stopped and then the phone shittery started. I have seriously been thinking of relocating back to Boston and going ghost for a while. I have some friends willing to help my daughter and I, and have had to leave my phone home and go use friends phones and computers to contact my friends in Boston to set this up. I suspect the person that is doing it and the only response to this B.S. from him is, your a loon and you need help, he is sick of hearing about it, and to go get a f_ing job. It’s almost impossible when my calls and voicemails are intercepted or blocked, numbers and messages from friends get blocked, just about every google app on my phone is locating my every move. The phone can listen to my conversations by just being in my purse, it snaps pictures, videos, etc. I have had to put electrical tape over the lenses on the phone because it’s creepy. My navigation arrow literally turns around and sends me the wrong direction. I have to listen to my boyfriend bitch because I didn’t call or text, however he must not hear me mention the phone won’t let me message or make calls. The do not disturb gets turned on and it schedules itself, I don’t set it, the phone mystericaly has a mind and will of its own. Amazingly my other half is the only one that can always contact me and ironically when the Wi-Fi and plane mode is enabled. He must have the Midas touch and golden fingers. The one thing I pray for every night is that I find out what it is and who did it so I can return the favor of disrupting their life for exactly as long it disrupts mine so they can really understand how it feels to be isolated with no contact or resources to help. I tell the appropriate resources only to be treated like I’m crazy and imagining the crap I have seen my phone doing. I think those appropriate people just don’t have an answer and it’s easier to blow me off!! I don’t have the correct terminology when trying to describe the crap, so it sounds difficult to believe. The guy that keeps saying to do the factory reset to fix this, here’s a news flash, I’ve done them a zillion times, however, in the files in emulated storage there is a pre-load and a ton of crap from getlib,init,bam_demux,cnss_prealloc, ghsic_ctrl, IEEE80211,lmh-monitor, mdss_panel_fb0,msm_ipc_router, msm_ISpo, gpnp-power-on_13,4, smp2p_test, doc:devfreq_spdm_CPU,tracing,mts_mask, surround_sound_3mic, wqeclient,fake-libs, fonts, screen overlays


I think my friend's phones is being tracked by her BF.

From Teekah on November 01, 2016 :: 1:08 pm

She has a Samsung Galaxy and today she got an alert for “lookout” that said she she had some kind of malware. Now her BF has done very shady things before so it is not surprise that he would do such a thing. He is also computer expert. She deiscovered a weird app called “Device” and it has a black box with a white vital sign on it. I tried to google this but I couldn’t find anything. It also has access to her camera, photos and contacts. Do you know what this app is and should she be concern?


Hard to answer without more info

From Josh Kirschner on November 03, 2016 :: 12:24 pm

It’s difficult to interpret what you’re finding without more details. However, If she’s getting an alert from Lookout Security, that’s definitely something she should pay attention to. Doesn’t mean it’s malware from her BF, it could have come from a number of places, and it may even be a false alert, but better safe than sorry.

In any regard, protecting your device isn’t particularly hard. Reset your device if necessary, put on a strong lock code and install Lookout Security or antimalware from another major provider. And don’t download attachments in MMS unless you know for sure what they are.


Help is needed, Josh!!!!!!!!!!!!

From Ahmed on November 02, 2016 :: 5:47 pm

Hi Josh,
I have noticed that you haven’t been answering for a while, I hope you would answer me because I really feel helpless and confused.
My partner had recently an access to one of my chats on FB messenger. She claimed that she did so through bypassing my entry password of my laptop. I have some evidence she could be truthful. However, I feel insecure! I read many articles on the internet, including your valuable ones, and I consulted some friends. I am intending to perform some steps. Please, have a look at them and let me know if you have any more suggestions:
-For the cell phone, I will do factory reset which will be followed by restoring all my data through my google account excepts the apps which I will reinstall manually, download the antispymoobile, in addition to Avg premium version and 360 security, apps, change the entry password and make it stronger (in addition to the chat messenger locker offered by 360 security app), and install the app notifier to let me know if someone wants to install any suspicious files in the future. Some questions in this context:
....I am unable to synchronize my contacts to the google account, what should I do? Any other ways to backup my data? how can I make sure that my data were safely backed up before I do the reset? does the google account backup any other data apart from the contacts, photos, and videos?
....Do I need to use any of the cell phone password locker apps?

-For my laptop, I installed the Malwarebytes and I ran it which revealed a huge number of suspicious files which I quarantined all. I would also change the entry password. In the near future, I would change all the passwords for all the websites and apps. I would also adjust the settings of my browser into not to remember the history or the passwords.
should I still be worried about the fact that she could installed any of the spying files on my laptop? and what should I do for this?

- Is there any potential harm or any measures I should take regarding my wireless network (which she is sharing and I am adjusting my network settings as if it is public), Bluetooth, or SIM or SD cards of the mobile?

-What should I do regarding the bypassing of the passwords for the laptop or the mobile? Pretty concerning matter!

-What is your opinion in using any of the password manager apps (e.g. sticky passwords), is it safer?

Thanks and sorry for the many questions!


I'm still here!

From Josh Kirschner on November 03, 2016 :: 12:11 pm

This article has obviously been around for a while and technology continues to change, so it’s due for an update. But let me give you my current recommendations.

For your phone, if you suspect she may have had access and installed malicious apps on your device, a factory reset is a good idea. However, any of our recommended mobile security programs should be able to detect spyware and remove it. I would suggest Lookout Security as a free option. AVG didn’t perform very well in my 2013 test, though I haven’t retested. I am not at all familiar with 360 Security. I would also not install App Notifier as it really isn’t necessary anymore (you’ll see any app installs in your notification bar) and I’m cautious about apps from unknown third-parties that have that level of control over your device.

Not sure why you can’t back up your contacts to Google, as that would obviously be the easiest way. You can also export them to your SIM card or an SD card in your Contacts menu and then re-import them after you reset. If you go into your phone Settings menu, then Accounts and select your Google account, you can see your sync settings to see what is being backed-up and what is not.

You shouldn’t need a cell phone password locker if you have secure screen lock on your device, but it wouldn’t hurt if you want to be extra careful (our recommendations: And the password manager can sync with your PC, giving you extra protection on both devices (and generally a good idea for ensuring you use strong passwords on the web).

For your laptop, I would also run Herdprotect ( Similar to MB, free to run scan and very thorough. Of course you need something to provide ongoing antimalware protection (our recommendations: And put a lock screen password on your laptop. If you want to go a step further, you can encrypt your hard drive using Bitlocker so it can’t be read without the right password. Depending on what version of Windows you’re running, you may need to upgrade to run Bitlocker. 

Most important communications will be encrypted over your wireless network. So while it is possible for someone on the network to see what sites you visited, they won’t be able to see any of the data sent. It’s possible to spoof sites and trick you into entering login info, but this is not something the average person is going to do.

So that is my tech advice. My non-tech advice is to consider why you’re with a partner that you have so little trust with? At the end of the day, you can only put so many technical protections in place, all of them have potential points of failure, and none of them will replace having a partner you can rely on.


Thanks! More about bitlocking and password bypassing?

From Ahmed on November 03, 2016 :: 4:02 pm

Thanks, Josh!
How can I do bitlocking of the hard device and how can this protect against spying?
How about the bypassing of entry passwords of the laptop (which she did already) and the cellphone?
One more concerning thing: she was able, with the aid of one of her friends, to one-time access my FB profile with only the profile name and phone number. How could this be done and how can be avoided in the future?


Herdprotect or Reason Core security?

From Ahmed on November 03, 2016 :: 4:23 pm

Another thing Josh, while I was trying to download herdprotect, there were three options: hedprotect full, herdprotect portable, and reason core security (recommended. which would one be the targeted one?


Tablet concerns

From Faye on November 19, 2016 :: 1:24 am

Is it possible for someone to know that you removed a photo from a tablet without having physical access to the tablet?


It's possible.

From Josh Kirschner on November 21, 2016 :: 4:20 pm

If there is spyware on your tablet that is syncing photos, then that person would be able to see when you deleted one of the photos. Another possibility (and probably more likely) is that you are syncing your tablet photos with an online storage or photo service and that person has access to that account.


hing i have deleted, mess, and pics too! deletes my google gmail account and changes my paswords so

From Huera DiamondBaby on December 03, 2016 :: 11:06 am

If my ex-bf copied my phone info so that he could encript and monitor my every move! is able lto lock me out my cell phone! upload, and recover anything i have deleted, mess, and pics too! deletes my google gmail account and changes my paswords so i dont have access! locks me out my apps and adds his own apps that hide in mine! he did this without my consent for me knowing but i noticed that i was getting double everything and when i sign in to google i would see devices named windows and linux and my settings would always be changing! i notied weird things shortly after getting! broke up in feb 2016! has gotten worse! is what he is doing legal! he managed to disable my ipad and he added somehow an administrative password on my laptop. had it for a week before i wasnt able to use it anymore ! its almost a 7 months and no o e been going on sin feb 2016! . 1 bought me a


Recieving two mwssage on imo

From Carl on December 06, 2016 :: 11:06 am

I have been spied before, Two days ago, I noticed that everytime I am getting double message on imo. I mean normally, I receive a single text on imo, but now I am receiving the same message twice. am I being spied?


My boyfriend hacked my phone - need help!

From Jessie on December 09, 2016 :: 7:12 pm

I recently found something installed on my iPhone called “TEEN-PC” I can’t find any information for it online. I am sure that my ex-boyfriend installed it onto my phone. He knows where I am, who I am with and has been terrorizing me for months. I want to go to the police - but I have no way to prove it.

Does anyone know about “TEEN-PC” - is there any way to PROVE that he has hacked my phone?

Pleas, I need help. I am living in terror and I need to put an end to this once and for all.


help me please

From Sandra Suarez on December 10, 2016 :: 8:41 am

So I jus got an AT&T go phone with my husband his broke and I took the son out to take care of it until I put in safe place. On well now my phone won’t receive or make calls but my internet.and text messages work fine. Did someone hack my calls to foward them to there phone.


Got ripped off

From Erica Smith on December 22, 2016 :: 6:48 pm

These guys .(JavaScript must be enabled to view this email address) with website are big THIEFTSvand SCAMMERS becareful and be cautious. This is the real face ANONYMOUS ripping people off. Here’s their bitcoin address>>>


Serious question

From Nora on December 26, 2016 :: 5:57 am

I’m just wondering if you’ll be able to answer this question because it is a bit off the topic,, before I went to bed my phone was 88% charged but when I woke up this morning it was 20% charged , can you tell me why this is And if I should get it checked out?


You must call the Secret

From Laurie Johnson on January 02, 2017 :: 9:57 pm

You must call the Secret Service. They are the ones dealing with this kind of stuff.



From Eric Kalpakoff on January 03, 2017 :: 9:59 am

Call me 8082094895


Why do I need to

From Laurie Johnson on February 09, 2017 :: 3:26 pm

Why do I need to call you if you please?


Tested And Trusted

From Zoe Newbold on January 04, 2017 :: 3:13 am

Hello, i’m an aspiring tech vulnerabiity expert and i’ve found only one hacker to be true so far. His contact is globalview.hacker AT gmail DOT com, i decided to post about him because of how much he enlightened me, impressed me and how i learnt so much from him. If you need any hack done (like upgrading credit score, clearing bad credit report, social media account hack, email account hack, phone hack, fake diploma, various spy hacks e.t.c. ) just contact him at globalview.hacker AT gmail DOT com… tell him i referred you, he’s going to help you.  I just saved you the stress of looking for a hacker. Thank me later


I need your help!!!

From Rmb123 on January 09, 2017 :: 6:30 am

Hello…I worked for a company used my an email address for my work at the company. I left the company almost a year ago, I stop using that email address I don’t even remember it. I did use my regular email address on my work computer at times. My question is…why when I’m filling out ssomething on my phone…autofill pops up up n my boss info


How to proceed

From Jason on January 21, 2017 :: 7:30 pm

Make: Samsung S7
Symptoms: random screen light up, warm battery (new phone)

If I were to guess who may be interested in my phone over the past 6 months it wouldn’t be a jaded lover, and perhaps somebody with a high tech/software background who is beyond just downloading a consumer app.

With that being said, in regards to Stagefright and remote hacking, is there any safeguard for harmful visible and invisible mms messages? I did receive a random photo from an unknown number this past fall and have been suspect of it.

And if there isn’t a safeguard for this kind of attack, is a factory reset even effective? As the attacker could just repeat attack…

Also, do you recommend rooting phones? And customizing? As I have heard this makes it potentially more vulnerable.

I also see you recommend Lookout Security. Would this be helpful in remote attacks. (What would you do in my situation is basically my question!)


With the level of technological

From Riley on January 26, 2017 :: 5:28 am

With the level of technological advancement in the present age, almost everything can now be done with a click of a mouse. Find out if your husband or wife is cheating on you, find out who they talk to when you are not there, hack any mobile phone (call log, text message, whatsapp etc), hack email, educational portal, website, database, increase your credit rating, clear criminal records and many more. You can also protect yourself from hack attacks.You can pretty much get anything you need done with Reputable Hacker. Contact: reputablehacker gmail com


my personal phone number is being used by someone else

From euby dankwa-smith on January 30, 2017 :: 10:08 am

i am happy to discuss this with you

some one has been using my phone to be sending messages to my boyfriend which i honestly did not send.  It was sentences but now it is nude pictures.

i am soo worried. please help.  how do i track the person



From CRYSTAL WYATT on February 03, 2017 :: 3:38 am



Every morning 'whoosh' like email sent without my knowing

From Gemmy on February 05, 2017 :: 1:15 pm

Every morning I hear a ‘whoosh’ from my Samsung Note 2, like an email is being sent. I have no idea how to stop this or what it is. Any ideas?


Check notifications bar

From Josh Kirschner on February 08, 2017 :: 2:09 pm

It’s hard to say as many apps or system functions could be creating that sound and I don’t have a Note 2 handy to check. But often, sound notifications will be associated with a visual notification in the notification bar. So we what is in there that could potentially correspond with your whooshing.


Worse than scary it's creepy

From Melissa Woods on February 07, 2017 :: 1:47 pm

Worse than scary it’s creepy I even got a video showed up one day of me getting out of shower!  My garage door goes up and down its because of I pad my sister gave my son first it was an iPod now ipad u can reset everything comes right back she even admitted it in a a sick day now what I’m done and tired of the shot I’m 43 cancer single mother I don’t understand


change Apple ID password, reset your device, update software

From Josh Kirschner on February 08, 2017 :: 2:22 pm

If you change the password for the Apple ID associated with the device to a new one, then reset your device and update the software, you should have a nice, clean iPad going forward. Also change the password for any apps that you don’t want others to have access to (e.g., garage door opener app).

As for the shower video, that would involve someone hiding a camera in your bathroom, so I would think you would have a pretty good idea who that could be. How many people have access to your bath room around the time of the video?


What the he'll can't send

From Melissa Woods on February 07, 2017 :: 1:48 pm

What the he’ll can’t send reply I wanted rediredlcted me


Android phone protection

From apksecurity on March 05, 2017 :: 7:16 am

Iphone protection is not a big issue because they do not execute those apps which are not recommended by Apple. Android phone protection has to be increase using different antivirus & security apps.


I have problem with IMO

From Ravi on April 11, 2017 :: 3:30 pm

Hi greetings!!

As i’m sending messages through IMO to my wife but a third person can also see my messages which i have sent to my wife..

How can it be possible? Is there any solution for this .. Please advice.




From Fabian on May 05, 2017 :: 2:16 am

I’m sure something has been given to my ph. I so jus try factory reset??????????


Photos sent to my phone. Is it a way of hacking??

From Ahmed on May 28, 2017 :: 8:08 am

My x-wife attempted to hack on my laptop before through breaking its windows password. Since then, I factory reset my phone and formatted my laptop. Recently, she sent to me through email some photos for my son’s birthday and pics for some documents. Could those be a new way for hacking? on which information I have on phone or laptop? If there is a potential danger, what should I do?



One more spy app

From Zina on May 30, 2017 :: 4:00 am

Hi, if you are discuss spy apps let me tell you about one more. You can also try it to use SpyToMobile if you want. It shows WhatsApp messages and calls and completely invisible.
It’s not a spam, just wanted to share



From ranger on May 30, 2017 :: 4:31 pm

someone contacted a person that i am friends with using my account name and posed as me till they asked for pics then they knew it wasnt and finally made them say it wasn but they knew there name and my name and my family name..hows that possible? hacked phone or kik account and even so i dont or they dont have a real name on there kik account


in trouble 4 not replying

From Rose on June 13, 2017 :: 6:01 pm

my phone reallyid is posses ,battery does to soon,my data,gone in a blank of an eye,lights on for no reason, volume 4 ringtones notification ,media,to the lowest or complily off,sends txt to contactsv,with out me typing nothing and now wont send txt messages pls help my phone is Samsung galaxy 5s


Factory reset

From Josh Kirschner on June 14, 2017 :: 11:13 am

The best option if you’re having significant issues with your phone is to backup your data, do a factory reset and then reload only those apps you really need, especially for older phones that may have built up a lot of unnecessary apps over time, some of which may not be behaving so nicely. That will solve many issues, whether related to spyware or other problems. If you’re still having battery issues after the factory reset, you may need a new battery. Smartphone batteries are usually pretty worn out after a couple of years and I’m assuming you’ve had that Galaxy S5 for a while.


Photos sent to my phone. Is it a way of hacking??

From Ahmed on July 10, 2017 :: 11:52 am

My x-wife attempted to hack on my laptop before through breaking its windows password. Since then, I factory reset my phone and formatted my laptop. Recently, she sent to me through email some photos for my son’s birthday and pics for some documents. Could those be a new way for hacking? on which information I have on phone or laptop? If there is a potential danger, what should I do?



USB connection

From Kass on July 23, 2017 :: 10:56 pm

Can you tell me if I plug my iPhone into my computer at work using my own USB cable to charge and list to my music sill this give employer access to my phone files. The phone does ask me if I want to give access and I say no


Yes, code can be hidden in pics, and used to hack your phone

From Ryan on July 29, 2017 :: 4:00 pm

A lot of phones are still vulnerable to “Stagefright” and other exploits that are compromised pics sent through MMS, email, etc. Often times the person receiving the message doesnt even have to click on the pic in order for the hack to execute. The phone will be set to download and open file attachments automatically by default.

Its a misconception for people to think that changing the settings from the default, “Automatic Download” to a Manual process of Downloading, and opening of attachments, that requires user interaction. Will keep you safe. If the person that is trying to compromise your phone, is someone you know, then you will manually open the attachment anyway, right?  Which will be hacked.

A lot of phones are patched against stage fright at this point.  But you would be surprised how many aren’t. And there are new exploits being found all the time.

Look on Google play. There are Stagefright Vulnerability detectors you there. Most dont fix the problem though. They just tell you whether you are/aren’t vulnerable to it.


I have a friend that gets code like this from my Google Voice Number

From Ryan on July 28, 2017 :: 9:29 am

It happens while we’re texting only. And it only happens to her. Anyone know what it is?

U) øUrd)ΠΔB

TjT” N=”èdQ V
£iΛØH&OΞ£çDçΓΔTΔ%Ξé¤P&A4;%rtòò(Rß=2DΔTߣΘéiS+ Φ£9ΩhΛ‘T¡øΦΩHV,.¡è2D*_)
éΞèçH!R$iJéèΩ¤IÆæ$ΦçH)AΦ_r$èΛ)OßΘ$rjS*Lò£Θt)S” (=$$)_).¡ò*E
H)TΦ1bèdΛ¤E¡øBtiS)E&£!uçò*HΦ9Zè¤R& ùI


Hard times nearly impossible

From Nicole durneb on August 04, 2017 :: 5:03 pm

I have a friend who is being domestically abused by her boyfriend ex-boyfriend and there is been weird situations going on with your phone due to what we believe is a spyware and she’s brought to the police and they can’t help her and there’s a program that is trying to catch him stalking her but they have been not able to catch him I need help trying to find the spyware on her phone it is a Samsung S4 and I think my phone has been acting weird lately too there are more details to why we think her phone is five where he will respond to a text message that she received from a friend by responding without physically seen her text message he then responds with a text message to her responding about the text message… I don’t know if you were able to catch that but that is only one detail of information and giving you please help us because the police can’t or are refusing whatever the problem is.


Updated information onbthis topic

From Michael wagerd on August 05, 2017 :: 7:03 am

i dont trust what josh says. maybe its that date but if it a android you would have to check what services are running and the infected software will open these services and the permissions that they open will give their rat software able to do everything that possable on the phone. they will be also elavating the services power that will make them look like they are the computer or phone so android it will be google services. The data will be sent through a ssl secure connection and that make it encripted so you wont beable to read it unless you decript the the data with the ca cert that being used for the connection also they now are using cloud services for the data connections what make it a cloud base attack just not a way some will look to find the hack. Fbi computer crimes lab where you might find someone in law enforcement that capable of helping. The police or fbi normal angents wont help and will treat you like your high on drugs if you ask them for help with this problem. computer forensic lab would be who you would google for a none police paid company to have your phone really cjecked out for this. They will be close to 500 a hour and will need some time to work on it so it really expencive to have this done. If there is great need like they are threating your life what i fully aware of the issues this cause from experence. 7 year victem myself from this and noone will beleive or help you with it. I also want to get a suport network for vistems of this. I reall want to make a very very helpful web site that that will go into what you can do to take the power back from these people. They are arrogent and have rape and enslavement tendencys. the best advise is make a security blanket that if anything happen will help people know what going on. So they know where to look if anything does happen.might save your life! Get profectionaall help. Like use every abuse network that you can find. Take it very serous. They might have your facebook account and know all your family and friends. if they make sure they dont have a missing person past. Make sure dont have a record of abuse phycial . They know where your at at all times. Everything your phone know and you do around you phone they know. The camera will shoot them pictires. They can get sound and hear everyt hing said in the room around your phone. Also they are breaking many federal laws. Like taping a phone without a warrent. Hacking and when you hack anything it about 10 federal laws they are doing every time they do it. Make a jurnal of every time you reset and force them out. And if they get in certain files they will just be reinstalled when you reset your phone. But every time they hack in it about 10 federal laws they broke for that act alone. Then the tapping the phone a charge and anyway they dige a very screwed if you make proof of it. Get software that will log ssl connections lear bitshark and use it for pcap logs to be able to find what the ip address is where the data is going. If you phone a dimanic ip address they will need to know what it changed to. So it will need a connection for them to get this data. and reamber log everything you can and back up your device files and logs not online make the data on a burned disk or a removable device. Find out how to use the progeaming tools if it android and pull backup copys of the whole phone. Dont beleive anybody that says your wrong or that it not a very very dangerous situation you and people they know you care about might be in. Depending on this person you might be in a life threating situation or be being blackmailed. Or recorded for sick sex sph site. All depends on who doing this to you and why. They dont understand what the dangers are that you might be in if they blow you and this off.


@Michael Wagerd

From Ryan on August 05, 2017 :: 12:25 pm

I think you’ve been the most informed responder in this topic so far. Thanks for taking the time keep people informed.

One thing to note though. In many cases the FBI, and other intelligence agencies probably aren’t your friend in these matters. Unless its an Ex Lover, or there is a specific person that you are pretty certain is behind your being stalked.  The intelligence community could very well be in on what people are dealing with. Look into gang stalking people. It’s no joke.

I wont be saying it again. But it needs to be said.  “gang Stalking”


Very Important Subject: Gang stalking via technology

From Kristie on September 20, 2017 :: 10:48 pm

I’ve been reading people’s concern in hopes to find a solution to their problems. When I read about this gangstalking it immediately got my attention. For the guy who knows so much about computers and having to hear over and over “factory reset”, Are you part if gangstalking? To deny this kind of computer stalking happens I’m wandering if you know a lot more if not engaged in it just by how confident you became to actually start diagnosing the person who brought up gang stalking with mental health issues. I can’t believe how fast you denied this could occur it’s abnormal what you did that I’m sure you know a gang stalker. To diagnose somebody or make a comment about their mental status makes me feel like vomiting. You had no business saying such mean things. I feel like writing articles on gang stalking now.


Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.