How to tell if someone is spying on your emails: Your “sixth sense” tells you that someone is spying on the emails you send to family, friends and co-workers. Since you have this “worm” in your head, you can no longer sleep peacefully. Tell me, would you like to remove this doubt and eventually run for cover to avoid being spied on by cybercriminals? If you answered in the affirmative, know that you have come to the right place at the right time!
In the next paragraphs, in fact, I can show you how to tell if someone spies on our emails adopting some simple tricks that can finally remove the doubts that haunt you so much. And should you unfortunately discover that you are actually being spied on, I will reveal what you can do to remedy the situation and, above all, how to prevent this unpleasant event from happening again in the future.
So, are you already in the “posts” of command, ready to start? Yup? Optimal! Make yourself comfortable, take all the time you need to concentrate on reading the next paragraphs and, more importantly, implement the “tips” that I will give you. Good luck for everything!
Find out if someone spies on your emails
There are various tricks that can allow you to understand if someone spies on our e-mails. In this case, it is possible to check the latest activities of your account, check for the presence of spy software on your devices and check if your provider has suffered cyber attacks in the last period.
Check the latest activity on your account
Check the latest activity on your account it’s a great way to find out if someone has made unauthorized access to your inbox. How? I’ll give you an example, so you can get right to the point. Let’s say you remember exactly you last logged in to your account last Monday at 8:15 pm. If a new access has been registered at a later time, evidently someone has “visited” your account, without you noticing.
Checking the latest activities on your account is an operation that varies depending on the manager of your mailbox. If you have an account Gmailfor example, you can check the last accesses in the following way: access the page Google My Accountclick on the item Device activity and security related events and, in the page that opens, check the accesses that have been made recently by reading the data in the box Recently used devices. If you have an account Outlook / Hotmailyou can check the access list here. On Freeinstead, you can check the last 200 accesses made to your mailbox in the last 30 days by first accessing your account and then going to Account management> Personal data> Access to the portal.
Note: when checking the last accesses, keep in mind that usually those made through mail clients (eg Microsoft Outlook, Mozilla Thunderbird, Apple Mail, etc.) are excluded.
Check for spy software on your devices
If you have fallen victim to a cybercriminal, gods may be “nested” on your devices spy software. As their name suggests, these software control everything the user does on their device, including sending and receiving emails – that’s why it’s essential check for spy software on your devices. How can you do it? I’ll explain it to you right away.
The best way to check for spy software on the PC is to rely on antivirus, or programs specialized in identifying and possibly eliminating computer viruses. On the square there are both free antivirus and paid antivirus: both solutions offer an acceptable level of protection, even if the paid ones allow you to take advantage of some extra features, such as the one that allows you to save the passwords of your accounts through real password managers. Whether you choose to use a free antivirus or a paid one, keep it constantly updated and run regular scans to check the security status of your PC.
Contrary to what some might think, the smartphone ei Tablet they are not immune to cyber attacks. This is why it is important to check that even on the latter there are no spy apps installed, through which their communications could be intercepted. Since many of these apps hide from the user’s eyes and may not be easily identifiable with a simple checking the installed apps, I suggest you follow the procedures that I will show you shortly.
For starters, start the browser of your device and try to connect to the addresses localhost: 4444 or localhost: 8888: many spy apps use them to “hide” their configuration panel through which you can uninstall them. Another way to find spy apps is to launch the dialer (the numeric keypad you use to dial the numbers to call) and enter the code *1 2 3 4 5: also in this case, if spy apps are installed on your device, you should see the configuration panel of the latter through which you can uninstall them.
I also invite you to pay attention to applications originally created for more than legitimate purposes, such as those for the parental control (ex. Qustodio And Mobile Fencewhich I told you about in my tutorial on how to check calls from another cell phone): they too can be misused by meddlesome family members to spy on your emails.
Check if your provider has suffered from known attacks
Another trick that I invite you to take to try to understand if your e-mails could be intercepted is to check if your provider has experienced known cyber attacks. You can do this not only by keeping yourself informed and reading the main hi-tech information sites (which regularly report violations affecting tens of thousands of users), but also by resorting to specific services, such as the well-known Have I Been Pwned?which allows you to check if your accounts have been the subject of a violation perpetrated on a large scale or not.
To use it, connect to the main page of Have I Been Pwned ?, type in the text field email adress the e-mail address of which you want to check the security status and presses the button pwned? to start the search. In a few moments you will be able to read the response: if the message appears Good news – no pwnage found! on a green background, you can rest assured that the service has not detected any known violations. If, on the other hand, you are shown the writing Oh no – pwned! on a red background, your emails may be spied on because the service has detected a known cyber attack.
I remind you that Have I Been Pwned? allows you to trace the e-mail addresses violated by consulting data that are in the public domain regarding known computer violations. This means that your account may be judged as “not hacked” even though there may actually have been a breach. The service simply serves to inspect violations already known.
What to do if someone spies on our emails
If you’ve come to the conclusion that someone spies on your emails, you need to immediately run for cover and change the login password of your e-mail account. By doing so, the cybercriminal who has been spying undisturbed on your private communications so far will no longer be able to do so. To prevent anyone from intercepting your email password in the future and reading the messages you exchange via your email address, make sure your new password meets the following requirements.
- Long – use passwords that consist of at least 15-20 characters.
- Invented – avoid using as passwords words that contain personal information, such as your date of birth, the names of your family members and so on: this information could be easily found by cybercriminals. Use, therefore, nonsense words containing numbers, uppercase and lowercase letters And symbols (!, ?, %etc.), in order to avoid dictionary-based attacks.
- Updated – update the password of your e-mail address (and also of all other accounts) at least once every 35-40 days.
- New and different for each account – do not use passwords that you have already used in the past and / or that you already use for other accounts. By doing so, in case they unfortunately intercept one of the passwords in use on other accounts, your e-mail box will be safe.
If you want to have more information on how to change your email password and how to create secure passwords, read the insights I just linked to you.
Another operation that I advise you to do is to activate the two-step verification on your email accounts: in this way, to log in to the latter, in addition to their main password, you will also be asked to enter a temporary verification code which is delivered via SMS or push notification on the smartphone. For more information on this, consult the official support pages of Google, Outlook / Hotmail And iCloud.