Newsletter

The likelihood is growing, as the minimal resources needed to exploit this vulnerability have made it available to cybercriminals with a much smaller profile who are seeking to steal 2FA codes for online accounts — rather than tap the phones of political leaders, CEO or other people whose communications could hold high worth in underground marketplaces. Malicious charging stations — including malware-loaded computers — take advantage of the fact that standard USB cables transfer data as well as charge battery.

Older Android phones may even automatically mount the hard drive upon connection to any computer, exposing its data to an unscrupulous owner. There are no widely-known instances of hijacked charging points, while newer Android phones ask for permission to load their hard drive when plugged into a new computer; iPhones request a PIN.

However, new vulnerabilities may be discovered.

Post navigation

National Guard, Army and Navy are among the government bodies known to use cellular surveillance devices the eponymous StingRays that mimic bona fide network towers. The American Civil Liberties Union has identified over 75 federal agencies in over 27 states that own StingRays, but notes that this number is likely a drastic underestimate. Individuals with intent to interfere with communications have the ability to do so. From security insiders to less tech-savvy folk, many are already moving away from traditional, unencrypted communications — and perhaps in several years, it will be unthinkable that we ever allowed our private conversations and information to fly through the ether unprotected.

Natasha Stokes has been a technology writer for more than 7 years covering consumer tech issues, digital privacy and cybersecurity. As the features editor at TOP10VPN, she covered online censorship and surveillance that impact the lives of people around the world. There was info that was accurate enough to where they knew personal info. Could someone have hacked or blocked my messages to him? From Josh Kirschner on February 26, :: pm. A Real Hacker will not charge anything in Advance came across a service where the guy literally teaches you how to do it.

Provides you video proofs and even send you video tutorial step by step explaining how you can actually get into any phone whether Android or iOS. Harish Negi. If it had helped me it can help you too. A friend of mine said that her boyfriend claimed to have visual coverage over her whilst he was in Europe.

How to Spy on Your Boyfriend’s Phone Without Him Knowing?

Not just a GPS location but that he claimed that he could see what she was doing and who or what was close to her. I told her he is bluffing but she claimed otherwise. I need clarification as to whether or not such tech is accessible to civilians and if so is it true that you can see someone in real time? Need some clarification….. From Josh Kirschner on February 28, :: am.

So if her boyfriend installed one of these apps on her phone then, yes, he could have been spying on her even when she was in Europe since these spy apps can be controlled anywhere via the Internet.

Is Someone Spying on Your Cell Phone? How to Tell & Stop Them

Someone spoke to me through my phone and referenced my place of employment, what the hell is this and how?! I was waiting for an answer to why my phone spoke by itself while I was texting someone. That was. I have posted three times. From Josh Kirschner on March 08, :: am. I have no idea why your phone said attention. Since it apparently only happened once, it was probably just some random combination of factors. When on a call, the name of the caller changes to unknown and the timer restarts.


  • The Free Hack Software which Read WhatsApp Online for Android Device.
  • 10 awesome things you didn't know your phone could do?
  • Spy on Android Phone for Sale;

What does that mean? From Josh Kirschner on March 08, :: pm.


  1. The New mobile phone Tracking Software download any cell.
  2. How to Use a Smartphone App to Find Your Car?
  3. Tech news that matters to you, daily;
  4. I asked my question three times! Well is there anything that you can tell me what those factors are that you said it could be a combination of,if not hacked then please explain something?

    How To Access Your Girlfriends \u0026 Boyfriends Mobile (Remotely Without Having Access To The Phone)

    From Josh Kirschner on March 18, :: pm. Weird stuff happens with tech all the time. If it is repeatable, you can try to track down the cause. My wife recently had her bank card used by a 3rd party. They also had her ebay and paypal accts and her google was tried to be logged on to from iraq. Im guessing her phone was hacked.

    Didnt find any new or unrecognized apps. We did recently buy a longer usb cord off of amazon. Could that be the source of her info being hacked?

    Post navigation

    From Josh Kirschner on March 23, :: pm. If someone has access to multiple accounts that sounds more like her passwords have been compromised through a breach, or poor password management or both.


    • How to Girlfriend or Boyfriend Proof Your Devices!
    • Part 1. How to Track Your Boyfriend's Phone Using PanSpy.
    • Top 6 Best Free Call Tracker Apps for Your Android;

    You should also install anti-malware on your computer and phone and do full scans. Hi Josh I commented here a few months ago regarding my hacked phone. Now I have had a new incident aND I hope you can explain it. I sent an email to someone using an address provided on their business website. I then left my phone charging while I was out of the house and no one had access to my phone.

    Free Cell Phone Tracker by Snoopza

    When I next turned on my phone I noticed that the email had been returned to me, at as undeliverable. I also noticed that at that exact same time an email I had sent out several weeks ago to reply to a Craigslist ad about a house rental, had oddly been sent back to me. I was puzzled why that happened weeks after I had replied to the ad, but the weirdest thing was I noticed 2 drafts were opened in my email program, both at This one seemed to have been sent thru Craigslist. Any ideas how someone was able to hack my email…it seems they somehow used the Craigslist relay email to do this.

    My nokia is not a smartphone. A couple of weeks ago I attended a public protest in London. Since then the battery has needed charging 5 times as much as normal. At one stage I was using my camcorder to film an arrest. Could my phone have been hacked too? I was filming a protest demo a couple of weeks back and found the footage on my camera of an arrest being made had been scrambled.

    Also, my Nokia phone battery had drained very quickly. The battery on the Nokia has struggled ever since and yet there were no problems previously. Did the police use some tech to damage my Nokia and to cause the battery to drain? From Josh Kirschner on April 02, :: am. If someone has information that says otherwise, I would like to see it. Approx 2 months ago, my android out of blue stopped taking pics of the aircraft around home.

    Mainly military as I live close to Navy base in Florida. After 3 or 4 pics and a quick look pics just taken, nothing but sky. I asked wife to come out back and take pic if military copter circling, at same time put my phone up to show her the aircraft did not show yet would in hers. We did this 5 or 6 times over next couple of hours with same result. Brother stopped by a little later and thankfully was able to witness this as well. Freaked em out quite a bit, myself have seen stranger things. Regardless I am thankful for 2 witnesses but stunned at how and why it happened.

    I can tell you this much. Ive also noticed the same exact effect even when trying to view these craft with standard binoculars , same exact results. I plugged my phone in at the airport charging stations and a green bar popped up on the bottom of my screen. I can be in the middle of doing anything on my phone and all of a sudden it kicks me out. Is this a hack, what can I do?