![]() At the end of this call I was “reassured” by an Apple Support Supervisor that my account was now safe. I was instructed to go through settings, login to my account with my new password, etc. During the call with Apple Support I followed all instructions on re-securing my Apple account which included changing my password. I immediately contacted both companies and reported the incident. This was an unknown phone number that has no known association with my Apple or carrier accounts. One day I turned my iPhone’s location feature off and an unknown telephone number remotely placed my iPhone into lost mode. This was easily dismissed due to announcement of battery problems. I believe the term for this is “device cloning”? Somehow they were capable of doing this without my knowledge.ĭoes anyone know how this could be possible or experienced something similar? This unknown phone number was never visible when searching through my Apple account or device.Įarly 2018 I noticed odd things happening to my iPhone, for example the iPhone not keeping charged battery. By doing this these individual(s) took complete control of my device/phone number. They managed to override my own mobile number by replacing it with theirs. Somehow an individual(s) were able to remotely gain access to both my Apple ID and device. Ken Colburn is founder and CEO of Data Doctors Computer Services, . Ask any tech question at facebook.Keep in mind Apple is offering One Million for researchers if they find security( hacked, cloned) issues with the Iphone If none of these steps leave you feeling confident, you can take the extreme step to reset your iPhone to the factory settings, but that should only be done if you know that you have a good verified backup of everything you care about. Things like strange screen activity that occurs when you aren’t using the phone, extremely slow startup or shutdown times, apps that suddenly shut down or a sudden spike in data usage can be indications of a compromised device. While there are ways for a skilled person to cover their tracks after compromising your device, there are often subtle indicators of a problem. You will also want to make an archive copy of what is stored in your iCloud account, then remove the content you want to protect. If you choose to do this, make sure you have another way to backup your iPhone first. If you don’t care about using iCloud as a backup for your iPhone, you can turn it off to eliminate this form of spying altogether. Most importantly, make sure you have two-factor authentication turned on for your Apple ID, which makes remote access impossible without them having your iPhone in their hands at the time. You should also change your security questions to answers that aren’t easily figured out. For instance, if you use the high school mascot question, make up a mascot instead of using what is a pretty easy thing to figure out by anyone that knows you. Start by changing the password to something that you’ve never used before, especially if the person knows your other passwords. ![]() They would need your Apple ID username and password in order to do this, so if you know that a third party has that information, there are a few steps you should take. ![]() If your iPhone backs everything up to your iCloud account, then someone can spy on your activity by accessing your iCloud account from any web browser. One of the best new features in IOS 14 is the " recording indicator" that will show you via a small dot above the battery icon if an app is currently accessing your camera (green) or microphone (orange).īringing up the Control Center will reveal which app is using either at the top, which can help you quickly identify a rogue app. Most of the spy apps will use names that seem like regular apps like a calculator or a game, so any app you don’t recognize should be examined and removed if you don’t need it. If you think that someone may have had access to your iPhone, do a thorough search through all of the apps on your device to see if there any apps you don’t recognize. The first would require them to have access to your iPhone while it was unlocked so they can install a remote access tool on it.ĭepending upon the tool they choose, they may need an extended amount of time with it to sneak an app in. QUESTION: Is there a way to tell if someone has hacked my iPhone and is spying on me?ĪNSWER: Apple has always been focused on making the iPhone as secure as possible and with the release of iOS 14, the options for controlling and monitoring what’s happening with your phone have dramatically improved.ĭespite all of these security features, there are a couple of ways that someone can gain access for spying purposes. ![]()
0 Comments
Leave a Reply. |