PDF download Download Article
Security tips to untap your cell phone
PDF download Download Article

Do you think your phone is compromised and need to untap it? While there are signs to look out for that your phone may be tapped, these indications can also point to anything from a hacker listening in with your microphone to a boss who doesn't want you to use the company's smartphone for personal pursuits. Read on to learn more about reclaiming your Android or iPhone from hackers and untapping it.


Untap Your Phone By Dialing This Number

Enter *73 or ##002# to get rid of all call forwarding set up on your phone, or call your carrier if that doesn't work. You can also dial *#21# to run the MMI code and see if call forwarding is set up through your carrier.

Section 1 of 4:

Cancel Unauthorized Call Forwarding

PDF download Download Article
  1. You can also check your phone for call forwarding in either the Settings menu or in Phone's settings menu.
    • iPhone: Open Settings > Apps > Phone > Call Forwarding (or Settings > Phone > Call Forwarding in iOS 17 and earlier).
    • Android: Open Phone > Settings > Supplementary Services > Call Forwarding or Phone > Settings > Calls > Call Forwarding.
  2. This code will work for both Android and iPhones and will let you know if call forwarding is on.
    • Open the Phone app to the keypad dialer.
    • Enter *#21# and press the "Dial" button (it's the green call receiver icon to place the call).
    • Read the MMI code.
      • If you see "Not forwarded" through all the sections, call forwarding is not enabled through your carrier.
      • If you see "Setting Interrogation Failed" through the menu, you need to contact your carrier to see if you have call forwarding enabled and set up.
    Advertisement
  3. This code works on both Android and iPhones but the numbers differ depending on the carrier you're using:
    • Open the Phone app to the keypad dialer.
    • Enter *73 (CDMA) or ##002# (GSM) and press the "Dial" button.
      • CDMA networks include carriers like Verizon and US Cellular.
      • GSM networks include carriers like AT&T and T-Mobile.
  4. Advertisement
Section 2 of 4:

Get Rid of Hackers on iPhone

PDF download Download Article
  1. Open Settings > General > iPhone Storage and look for any apps that you don't remember downloading or if you think they contain malware.
    • If you find an app that you want to delete, tap on it, then tap Delete App.
  2. Profiles like this configure how the iPhone looks and behaves; there are many legitimate uses for multiple profiles, like if you use an iPhone from your work or a volunteer organization.
    • To check these profiles, go to Settings > General > VPN & Device Management.
      • If you see a configuration that you don't recognize, tap it and tap Remove Profile.[1]
  3. An outdated iOS is at a higher risk of being hacked, getting malware, and other general security flaws.
    • To update your iPhone, go to Settings > General > Software Update > Install Now. If you don't see "Install Now," your iPhone is updated.
  4. You want to keep your phone and personal data updated with the latest security updates, even if they are pushed after an iOS update.
    • To enable this feature, go to Settings > General > Software Update > Automatic Updates > Security Responses & System Files.
  5. This completely reverts your phone to how it was when you first got it. This process will delete everything on your phone, so make a backup if you don't have one already.
    • To reset, go to Settings > General > Transfer or Reset iPhone > Erase all Content and Settings.[2]
  6. Advertisement
Section 3 of 4:

Get Rid of Hackers on Android

PDF download Download Article
  1. Go to Settings > Apps to see a list of all the apps installed on your Android. Some apps, like Google Apps Device Policy, are MDM apps (mobile device management apps) and can be used for legitimate reasons, like a business phone.
    • However, if you don't recognize the app's name and the organization you got the phone from also doesn't recognize it, it might be malicious. Tap the app and tap Delete App.
  2. An account can be used to control how your Android behaves, so you don't want an unrecognized account to be able to access your phone and your personal data.
    • Go to Settings > Accounts and backup > Manage accounts.
    • If you see an account that you don't recognize, like a Facebook account with a weird combination of numbers, tap that account, then tap Remove account.[3]
  3. Outdated software can have security flaws, glitches, and bugs.
    • To update, go to Settings > Software update > Download and install.
  4. It's completely plausible that you installed an app and then it proceeded to download malware or spyware without your consent.
    • To turn this setting off, go to Settings > Apps > ⋮ > Special access > Install unknown apps and tap Deny all to disable this feature.
  5. These apps are generally used by employers and businesses to protect work-related data by enforcing password requirements and other security policies on your phone.
    • To see the device admin apps on your phone, go to Settings > Apps > ⋮ > Special access > Device admin apps.
      • If you see any apps toggled on that you don't recognize, toggle it off.
  6. This completely reverts your phone to how it was when you first got it. This process will delete everything on your Android, so make a backup if you don't have one already.
    • To reset to factory settings, go to Settings > General management > Reset > Factory data reset > Reset.[4]
  7. Advertisement
Section 4 of 4:

Tips to Protect Yourself

PDF download Download Article
  1. Apps through these stores are vetted to make sure that there's no malicious code within them if they are updated.
    • However, apps that haven't been updated in a long time carry the chance of being compromised by hackers.
    • Protect your data and phone by reading app reviews and understanding how the app works.
  2. Using the same password between accounts is dangerous, so create secure and unique passwords for each login.
  3. Updates keep security vulnerabilities to a minimum. Outdated apps or operating systems are more likely to get infected.
  4. This provides you more security with the apps you get from the Play Store. Play Protect scans apps in the Store that you downloaded or plan on downloading to see if they are safe and free of malicious code.
    • While this is on by default, you can turn it off. Here's how to turn it back on. Open the Google Play Store app, tap your profile icon, tap Play Protect, then tap the gear icon in the top right corner. Finally, tap the toggle next to "Scan apps with Play Protect" to enable it (colored and pointing right).[5]
  5. 2fA makes it harder for hackers to gain access to your Apple ID.
    • On your iPhone, go to Settings and tap your name. Click Sign-in & Security > Two-Factor Authentication > Continue. Follow the on-screen instructions to set up 2fA. [6]
  6. Advertisement

Expert Q&A

Ask a Question
200 characters left
Include your email address to get a message when this question is answered.
Submit
Advertisement

Video

Tips

Submit a Tip
All tip submissions are carefully reviewed before being published
Name
Please provide your name and last initial
Thanks for submitting a tip for review!

You Might Also Like

Remove a Hacker from Your iPhoneIs Your iPhone Hacked? Here's What to Do About It
Fix a Hacked Android PhoneFix a Hacked Android Phone
Tell if Your Phone Is Being Tracked Tell if Your Phone Has Been Tapped
Tell if Your iPhone Is HackedIs Your iPhone Hacked? How to Tell and What to Do
Prevent Your Cell Phone from Being HackedHow To Keep Your Cell Phone Safe From Hackers
Tell if Your Phone Is Tapped Tell If Your Phone Is Tapped: Telltale Signs + Fixes
Stop Someone from Mirroring Your PhoneWhat to Do If Someone Is Mirroring Your Phone
Can Someone Hack My iPhoneCan Someone Hack Your iPhone? Signs, Fixes, & Safety Tips
Tell if Someone Is Accessing Your iPhone Remotely10 Signs Your iPhone is Being Accessed Remotely & How to Fix It
Prevent HackingStay Safe From Hackers: Protecting Your Accounts & Devices
Reverse Phone CloningWhat To Do If Your Phone or SIM Card is Cloned
Make Your Phone Impossible to Track Make Your Phone Harder to Track
Forward Calls on AndroidSimple Ways to Set Up Call Forwarding on Android
Activate Call Forwarding Set Up Call Forwarding on Android, iPhone, & Landline
Advertisement

About This Article

Luigi Oppido
Reviewed by:
Computer & Tech Specialist
This article was reviewed by Luigi Oppido and by wikiHow staff writer, Darlene Antonelli, MA. Luigi Oppido is the Owner and Operator of Pleasure Point Computers in Santa Cruz, California. Luigi has over 25 years of experience in general computer repair, data recovery, virus removal, and upgrades. He is also the host of the Computer Man Show! broadcasted on KSQD covering central California for over two years. This article has been viewed 5,479 times.
How helpful is this?
Co-authors: 4
Updated: August 7, 2025
Views: 5,479
Categories: Cell Phones
Thanks to all authors for creating a page that has been read 5,479 times.

Is this article up to date?

Advertisement