Sign in to the Apple ID website (https://appleid.apple.com) and review all the personal and security information in your account to see if there is any information that someone else has added. If you have two-factor authentication turned on, review trusted devices for any devices that you don't recognise.
From the Devices section of your Apple ID account page, you can find all of the devices that you're currently signed in to with your Apple ID, including Android devices, consoles, and smart TVs: Sign in to appleid.apple.com,* then select Devices.
Signs that your Apple ID has been compromised
Your password no longer works, you don't recognize some or all of your account details, or your device was locked or placed in Lost Mode by someone other than you.
If you see anything untoward or suspicious – a device linked to your Apple ID that you don't recognize, for example – then your account may be compromised. You should remove the device from your account using the red option at the bottom of the screen for that device.
If you see a message that says "This subscription is already being used with a different Apple ID," contact Apple Support to unlink your Apple ID. If you have a Dual SIM phone, you can connect your Apple subscription on your default line.
Yes, a partner, parent, or even employer can gain remote, real-time access to your iPhone using spying software. Spyware can track your GPS location, record your keypad inputs such as credit card numbers and passwords, and monitor your calls, texts, app usage, emails, voice, and other personal data.
Unfortunately, yes. Security and privacy are central to the iPhone's design, but it's still possible for someone to hack and control it remotely. If someone hacks your iPhone, restart it, change your Apple ID password, update iOS, and contact Apple Support.
how can I tell if someone is accessing my iCloud account from another device? Your Apple ID might be compromised if you receive an account notification from Apple for a change you didn't make, or if you notice account details or changes you don't recognize.
Once you've had your Apple ID hacked, a hacker can change your password, remotely erase or lock your iPhone, or even make purchases with it!
If someone logs into your iCloud using an Apple device, they will be able to check all the iMessages you have saved into iCloud. Those include sent and received messages. However, if they log in to your iCloud on the web, they will not see or send your iMessages.
Go to Settings – Applications – Manage Applications or Running Services, and you may be able to spot suspicious looking files. Good spy programs usually disguise the file names so that they don't stand out but sometimes they may contain terms like spy, monitor, stealth, and so on.
Only if someone knows your Apple ID and password, access to the device that receives the verification code (if you have 2FA enabled), and a device that you previously signed into may they log into your iCloud without your knowledge.
Signs That Someone Has Remote Access to Your Phone
The battery drains quickly even when not in use. Higher data usage than usual. Noises in the background when you're on a phone call. You receive unusual messages, emails, or notifications.
The easiest way to discover if someone has tried to install spyware on your iPhone or Android smartphone is to scan your phone with security software like Certo AntiSpy (for iOS devices) or Certo Mobile Security (for Android devices).
Unfortunately, there is no direct way to check if the camera or the microphone of your Android device is being accessed. However, there is a workaround for it. Android users can download an app called Access Dots from the Google Play Store which will notify users the same way iPhone does.
Part 1: Can I Use the Same Apple ID on Two Phones
Yes, you can. People can use the same iCloud account on up to 10 devices. However, when using the same Apple ID on two iPhones, you should do it without Mirroring.
Yes, it's definitely possible for someone to spy on your text messages and it's certainly something you should be aware of – this is a potential way for a hacker to gain a lot of private information about you – including accessing PIN codes sent by websites used to verify your identity (such as online banking).