Technology
How hackers can send text messages from your phone without you knowing
There is enough to worry about in life without the additional stress and terror of finding out your friends, family or complete strangers have been receiving a text message from “you” without your knowledge. How did they do that? How did they send a text message from your phone without you knowing?
This is a real threat that many people face every day. That’s why we felt it was so important to answer this question sent in from John.
“I just found a text written to me, which was a response to a text I sent. Problem is, I didn’t send the text? I’m 65 years old, and not as spry as I once was, but I do not remember sending the text. My wife is trying to convince me I’m going crazy. She says it’s impossible for someone to send a text (impersonating me) without having possession of my phone. Is that true? Can someone hack your phone and send text??” – John, Fort Myers, FL
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
What is SMS spoofing?
We’re sorry to hear that you’re going through this, John. It is possible for someone to send a text message impersonating you without having possession of your phone. This is known as SMS spoofing, and it is a technique used by cybercriminals to send fraudulent text messages.
How does SMS spoofing work?
SMS spoofing works by manipulating the sender ID of a text message to make it appear as if it was sent from a different phone number. This can be done using various online services that allow users to send text messages with a fake sender ID. Cybercriminals will change the sender ID to impersonate friends, family, or a legitimate company.
Example of text message screenshot of hacker pretending to be a bank (Kurt “CyberGuy” Knutsson)
It is important to note that SMS spoofing is illegal and can be used for malicious purposes such as phishing scams, identity theft, and fraud. Scammers bank on the combination of familiarity and urgency to get you to interact with their text either by clicking on a link, downloading a file, or responding with personal information.
How to spot and avoid SMS spoofing scams
Here are the top 3 reasons why scammers often send text messages under a fake sender ID with some urgent request:
1. Trick you into clicking on a malicious link that leads you to a malicious website to rob you of your personal or financial information or even unleash malware or viruses to your phone.
Screenshot of text SMS spoof trying to trick you to click a malicious link (Kurt “CyberGuy” Knutsson)
2. Lure you into paying a fake bill under the guise of a reputable or familiar company.
Screenshot of text spoof trying to trick you to pay fake bill (Kurt “CyberGuy” Knutsson)
3. Damages your reputation or relationship with friends, family, and others by sending harmful messages.
Screenshot of text spoof trying to damage your reputation (Kurt “CyberGuy” Knutsson)
iMessage Vulnerabilities
SMS spoof on Apple device from hacker posing as financial institution (Kurt “CyberGuy” Knutsson)
In the past, many Apple devices were considered to be virtually immune to viruses and malware. Unfortunately, due to bugs in iOS, hackers can take over someone’s device just like any other device on the market. While Apple patches these vulnerabilities on a consistent basis, this leaves iPhone users vulnerable to SMS spoofing, too.
A hacker can use “interaction-less” bugs to send a specially crafted SMS message and the iMessage server can send user-specific data, including images or SMS messages, back to them. The user doesn’t even have to open the messages to activate this bug. Additionally, hackers can send malicious codes through texts, embedding them onto the user’s phone. These vulnerabilities are unique to Apple devices.
Aside from the specific vulnerabilities, hackers generally need the user to interact with the text message before the malicious code gets unleashed onto the device.
MORE: CHECK AND DETECT IF SOMEONE YOU KNOW IS SNOOPING ON YOUR IPHONE
7 Actions to take if you suspect SMS spoofing
If you suspect that your phone has been hacked or that someone is impersonating you, it is important to take immediate action. Here are some steps you can take:
1) Have good antivirus software on your phone: Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links that may install malware on your devices, allowing hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.
2) Keep your phone software updated: Both iPhone and Android users should keep their phone’s OS and apps updated regularly as Apple and Google release patches to vulnerabilities as they are discovered. Updating your phones can prevent hackers from exploiting security flaws and sending text messages from your phone without you knowing.
3) Change your passwords: Change the passwords for all your online accounts, including your email, social media, and banking accounts. Do not use easy-to-guess information such as your birthday or address. Use strong, unique passwords that are difficult to guess; preferably ones that are alphanumeric and, if applicable, include special symbols. Be sure to do this on another device in case there is malware on your phone monitoring you. Consider using a password manager to generate and store complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.
4) Enable two-factor authentication: Enabling two-factor authentication on all your online accounts will add an extra layer of security to your accounts and make it more difficult for hackers to gain access.
5) Contact your mobile carrier: Contact your mobile carrier and report the incident. They may be able to help you identify the source of the text message and take appropriate action.
6) File a police report: If you believe that you have been a victim of identity theft or fraud, file a police report with your local law enforcement agency.
Fraud detection text message alert on iPhone (Kurt “CyberGuy” Knutsson)
7) Watch your connections: When possible, do not connect to unprotected or public Wi-Fi hotspots or Bluetooth connections. Turn off the Bluetooth connection when not in use. On most iPhones, you can choose who to receive files or photos via AirDrop (a Bluetooth feature) from by selecting to receive from “no one,” people in your Contacts, or Everyone. We suggest you set it to “no one” and only turn it on when you are with the person you are sending or receiving a file or photo from.
MORE: GUARD YOUR PASSWORDS: CHERRYBLOS; FAKETRADE MALWARE THREATEN ANDROIDS
I’ve been scammed by SMS spoofing. What to do next?
Below are some next steps if you find you or your loved one is a victim of identity theft from an SMS spoofing attack.
1) Change your passwords. If you suspect that your phone has been hacked or that someone is impersonating you, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn’t’ recording you setting up your new password on your hacked device. Use strong and unique passwords that are hard to guess or crack. You can also consider using a password manager to generate and store your passwords securely.
2) Look through bank statements and check account transactions to see where outlier activity started.
3) Use a fraud protection service. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
Some of the best parts of using an identity theft protection service include identity theft insurance to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.
4) Report any breaches to official government agencies like the Federal Communications Commission.
5) You may wish to get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft, and if being a victim of criminal identity theft leaves you unable to secure employment or housing
6) Alert all three major credit bureaus and possibly place a fraud alert on your credit report.
7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.
8) Alert your contacts. If hackers have accessed your device through SMS spoofing, they could use it to send spam or phishing messages to your contacts. They could impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.
9) Restore your device to factory settings. If you want to make sure that your device is completely free of any malware or spyware, you can restore it to factory settings. This will erase all your data and settings and reinstall the original version. You should back up your important data BEFORE doing this, and only restore it from a trusted source.
If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.
MORE: HOW TO TELL IF SOMEONE HAS READ YOUR TEXT MESSAGE
Kurt’s key takeaways
It’s possible for someone who doesn’t have physical possession of your phone to spoof your information for SMS spoofing. Though you might not have control over who gets your number, there are steps you can take to protect yourself.
Have you ever received a convincing text spoof message? What were the telltale signs that it was a spoofed message? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Ideas for using those Holiday Gift cards
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Sony’s AI graphics upscaling for PS5 Pro games is getting a big update tonight
Sony’s upgraded PlayStation Spectral Super Resolution (PSSR) technology is rolling out to several titles on the PS5 Pro, including Cyberpunk 2077, Final Fantasy VII Rebirth, Silent Hill 2, and more. Digital Foundry got a chance to test some of them and found that the “new upscaler delivers the kind of upgrade we were looking for from PS5 Pro.” Problems with shimmering, flickering, and other visual artifacts have been addressed, and they said it now delivers crisper and more consistent in-game graphics.
This is the first upgrade we’ve seen from AMD and Sony’s combined Project Amethyst work on improving the effect of rendering a game at a lower resolution, then using AI trained on graphics to analyze each frame and upscale it, delivering improved quality on the same hardware without reducing the framerate. The upgraded PSSR is included with the latest PS5 system software update, which will start rolling out “in phases” on March 17th at 1AM ET, and Sony says its improvements will also improve AMD’s next FSR update when that rolls out.
Assassin’s Creed Shadows and Cyberpunk 2077 will also get a patch with the PSSR update in the “coming weeks,” while CrimsonDesert will adopt the tech when the game launches on March 19th, according to Sony. You can also toggle the updated tech on or off for PS5 Pro games not on this list that already support PSSR, though Sony notes that “results may vary by title.”
Technology
The email trick that reveals your hidden online accounts
NEWYou can now listen to Fox News articles!
Most of us have created far more online accounts than we remember. Shopping sites, travel apps, rewards programs, forums and random services all ask for a quick sign-up. At the time, it feels harmless. Years later, those accounts are still sitting online, tied to your email address.
That matters more than you might think. Old accounts increase your digital footprint. They can also expose personal information if a company suffers a data breach. Fortunately, there is a simple way to uncover many of them in just a few minutes. The answer is already sitting in your inbox.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Your email inbox keeps a hidden record of your accounts
Nearly every website sends a confirmation message when you create an account. That means your inbox quietly becomes a timeline of every service you joined.
11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025
Security experts say reviewing old account confirmation emails is one of the fastest ways to find services you no longer use. (Tempura/Getty Images)
Instead of trying to remember dozens of sites, you can search your email and let those messages reveal the accounts for you. In many cases, people discover accounts they forgot about years ago.
- Old shopping stores
- Unused travel sites
- Rewards programs
- Apps you downloaded once
The list can grow quickly once you start looking.
Step 1: Search your inbox for sign-up emails
Start by opening your email account and using the search bar. Try searching these phrases one at a time:
- Welcome
- Verify your email
- Confirm your account
- Create account
- Thanks for signing up
- Account created
These phrases appear in many sign-up emails. As a result, your inbox will often surface dozens of account confirmations. Scroll through the results and pay attention to the companies that appear. You may spot services you have not thought about in years.
Step 2: Scan the sender names
Next, look closely at the companies sending those messages. Many people quickly find accounts from:
- Old shopping sites
- Rewards programs
- Travel accounts
- Apps and services
Make a short list of accounts you no longer use. Even a few minutes of searching can reveal a surprising number. At this point, you have essentially built a cleanup checklist.
THINK YOUR NEW YEAR’S PRIVACY RESET WORKED? THINK AGAIN
Searching your inbox for common sign-up emails can reveal dozens of forgotten online accounts still tied to your email address. (Rawf8/Getty Images)
Step 3: Log in and delete the accounts
Once you identify a site, visit the official website directly rather than clicking links in old emails. Then look for account settings. Most platforms include an option such as:
- Account Settings
- Delete Account
- Close Account
If you cannot find it, contact the company’s support team and request removal. While it takes a little time, deleting unused accounts reduces the number of places storing your personal information.
Bonus trick: Search for password reset emails
There is another search that often reveals even more accounts. Look for these phrases in your inbox:
- Reset your password
- Password reset request
If those messages appear from a company, it usually means you created an account there at some point. People are often surprised by how many services show up during this search.
Another smart step to shrink your digital footprint
Closing old accounts helps reduce risk. However, your information may still exist in another corner of the internet. Data broker companies collect personal details from apps, websites and public records. They often build profiles that include addresses, phone numbers, browsing habits and more. After removing unused accounts, many people choose to use a data removal service that requests the deletion of those listings. That combination can dramatically reduce the amount of personal information floating around online.
FROM TIKTOK TO TROUBLE: HOW YOUR ONLINE DATA CAN BE WEAPONIZED AGAINST YOU
A quick inbox search using phrases like “Welcome” or “Verify your email” can uncover accounts you created years ago. (Peter Dazeley/Getty Images)
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Digital clutter builds quietly over time. Every sign-up adds another account connected to your email address. The good news is that your inbox already holds the map to many of them. A few quick searches can reveal forgotten accounts that have been sitting online for years. Cleaning them up takes some effort, but the payoff is real. Fewer accounts mean fewer places where your personal information can leak or be exposed. So here is something worth thinking about.
If your inbox reveals dozens of forgotten accounts today, how many companies still have your personal information without you even realizing it? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Aether OS is a computer in a browser built for the AT Protocol
Aether OS puts a full-fledged desktop in your browser that ties directly into the AT Protocol. That means it connects to your Bluesky account and other public records. It offers a pretty full suite of apps, 42 in total, covering text editing, task management, and social media. There’s even a rudimentary tracker for making chiptunes, a DAW, and a video editor.
Of course, part of the appeal is also the cyberpunk good looks that draw obvious inspiration from The Matrix.
Right now, the project is in alpha, and there are a lot of rough edges. Documentation is also basically non-existent. So, if you get stuck trying to use an app, you’re kind of SOL. Oh, and nothing is encrypted or permissioned, so be careful what you store — it’s all publicly visible.
-
Oklahoma1 week ago
OSSAA unveils Class 6A-2A basketball state tournament brackets, schedule
-
Oklahoma2 days agoFamily rallies around Oklahoma father after head-on crash
-
Michigan7 days agoOperation BBQ Relief helping with Southwest Michigan tornado recovery
-
Southeast7 days ago‘90 Day Fiancé’ alum’s boyfriend on trial for attempted murder over wild ‘Boca Bash’ accusations
-
Health1 week agoAncient herb known as ‘nature’s Valium’ touted for improving sleep and anxiety
-
Nebraska3 days agoWildfire forces immediate evacuation order for Farnam residents
-
Business1 week agoCommentary: In two new court cases, judges find that AI does not have human intelligence
-
Technology1 week agoTime’s running out to get a free gift card when you preorder a new MacBook