How to know if someone has hcked into your iphone?

Any obvious signs?

Ure sign of system compromise No. 1: Fake antivirus messages

In slight decline these days, fake antivirus warning messages are among the surest signs that your system has been compromised. What most people don't realize is that by the time they see the fake antivirus warning, the damage has been done. Clicking No or Cancel to stop the fake virus scan is too little, too late. The malicious software has already made use of unpatched software, often the Java Runtime Environment or an Adobe product, to completely exploit your system.

Why does the malicious program bother with the "antivirus warning"? This is because the fake scan, which always finds tons of "viruses," is a lure to buy their product. Clicking on the provided link sends you to a professional-looking website, complete with glowing letters of recommendation. There, they ask you for your credit card number and billing information. You'd be surprised how many people get tricked into providing personal financial information. The bad guys gain complete control of your system and get your credit card or banking information. For bad guys, it's the Holy Grail of hacking.

What to do: As soon as you notice the fake antivirus warning message, power down your computer. (Note: This requires knowing what your legitimate antivirus program's warning looks like.) If you need to save anything and can do it, do so. But the sooner you power off your computer, the better. Boot up the computer system in Safe Mode, No Networking, and try to uninstall the newly installed software (oftentimes it can be uninstalled like a regular program). Either way, follow up by trying to restore your system to a state previous to the exploitation. If successful, test the computer in regular mode and make sure that the fake antivirus warnings are gone. Then follow up with a complete antivirus scan. Oftentimes, the scanner will find other sneak remnants left behind.

Sure sign of system compromise No. 2: Unwanted browser toolbars

This is probably the second most common sign of exploitation: Your browser has multiple new toolbars with names that seem to indicate the toolbar is supposed to help you. Unless you recognize the toolbar as coming from a very well-known vendor, it's time to dump the bogus toolbar.

What to do: Most browsers allow you to review installed and active toolbars. Remove any you didn't absolutely want to install. When in doubt, remove it. If the bogus toolbar isn't listed there or you can't easily remove it, see if your browser has an option to reset the browser back to its default settings. If this doesn't work, follow the instructions listed above for fake antivirus messages. You can usually avoid malicious toolbars by making sure that all your software is fully patched and by being on the lookout for free software that installs these tool bars. Hint: Read the licensing agreement. Toolbar installs are often pointed out in the licensing agreements that most people don't read. I think it is probably not possible to hack first of all but if you are still worried and you need get some security in your device, then install Leo Privacy Guard to protect all your private images and videos.

I think it is probably not possible to hack first of all but if you are still worried and you need get some security in your device, then install Leo Privacy Guard to protect all your private images and videos.

  • Will someone know if you save their voicemail to your own files on iPhone? They won't know if I do this right? I wanna save a voicemail to my files but I don't want the person who left the voicemail to know.
  • Someone has to know what app this screenshot comes from? The icon is a woman with long curly hair but when I open it you get this purple status bar then goes to a picture of two iPhones and freezes. Its on my wifes iPhone but she won't tell me what it is so I assume its female related
  • I think someone has had physical access to my iphone 5 and installed a spy software into it? My iphone is not jailbroken. Is it possible he jailbroke my iphone to install a virus onto it and then unjailbroke my iphone to how it was before it was jailbroken so I don't notice any differences with my iphone? anyway the bottom line is: what are the chances someone could have installed a spy software onto my iphone if my iphone is not jailbroken? Give me a probability from 0 to 100 that my iphone has a spy software installed into it secretly
  • I know someone who has stolen stuff in hes house? Basically i got a simple question i know someone who has a few items they are reported lost/stolen the kindle fire's (i think) and he has like 6 xbox's ipads/iPhones/Sony tablets/Kinects if i report this guy by crimestoppers what are the chances or anything happening to him? also what could he get arrested for? i have proof as well he posted it on hes facebook… We're from the UK and he is 18 years old he has been in trouble before he has a criminal record for Burglary.