PDF download Download Article
Prevent hackers from spying on your screen
PDF download Download Article

Are you worried about someone accessing your phone, mirroring your screen, or even controlling your phone remotely without your permission? While virus infections are rare on iPhones, there are still precautions you can take to avoid them on both iOS and Android. If you think someone's spying on your device without your knowledge, take note of any strange behavior you experience from your phone. This wikiHow will show you how to stop someone from mirroring and spying on your iPhone or Android device.

Protect Your Phone from Unwanted Mirroring

If you suspect someone is mirroring your phone, turn off screen casting or mirroring in your settings or Control Center. Disconnect from Wi-Fi and Bluetooth and remove any suspicious apps. Change the password for your Apple or Google Account. Check your app security settings and disable any suspicious app permissions.

Section 1 of 3:

What to Do If Your Phone Is Being Mirrored

PDF download Download Article
  1. 1
    Disable screen mirroring and related settings. If someone is remotely controlling or screen mirroring your phone, you can usually stop that from happening in your phone’s Settings. Here’s how:
    • iPhone:
      • If someone is actively mirroring your screen, swipe down from the top right side of your screen (or up from the bottom if you have a Home button) to open the Control Center. If the mirroring icon (which looks like two overlapping squares) is blue, your screen is being mirrored to another device. Tap the icon, then select Stop Mirroring.
      • Open the Settings app and tap General > AirPlay & Continuity.
        • Tap Automatically AirPlay and make sure it’s set to Never or Ask.
        • Go back to the main AirPlay & Continuity menu and toggle off Handoff. If someone has hacked into your Apple Account on another device, this will prevent them from accessing certain apps and tasks that you’re currently using on your iPhone.
        • Toggle off Continuity Camera if you’re worried that a hacker might have access to your iPhone’s camera.
        • Toggle on Require Password at the bottom of the menu and enter a secure AirPlay password.
    • Android:
      • Open Settings and search for screencasting. Select Screencasting from the results, then select Disconnect or Stop Casting next to any devices you’re currently connected to. You might also see an option to toggle off Cast or Screen mirroring in addition to disconnecting individual devices.
      • Limit who can access your phone via Chromecast by opening the Google Home app, then selecting any listed Chromecast devices. Tap the Settings (gear) icon, select Recognition & sharing, and toggle off Let others control your cast media.
  2. If your phone is being mirrored to a TV or another screen, disable Bluetooth and Wi-Fi. Smartphones can cast their screens to another device using AirPlay or Screen Mirroring. In most cases, this is initiated by the device owner. However, if you don't want to accidentally cast your phone, you can disable Bluetooth and Wi-Fi. AirPlay and Screen Mirroring rely on these services to transmit the signal to another screen. Hackers can also access your phone remotely over an insecure data or Bluetooth connection.
    • On an iPhone, swipe down from the top right corner of the screen (or swipe up from the bottom, if you have a Home button) to access the Control Center. Tap the Wi-Fi and Bluetooth symbols to quickly disable them (they’re blue if you’re connected, and white if you’re disconnected).
    • On an Android phone, swipe down from the top of the screen to open Quick Settings, then tap the Wi-Fi symbol to turn off Wi-Fi. You can also tap the Bluetooth symbol in the same menu to turn it off.
    Advertisement
  3. 3
    Secure your Apple, Google, or Samsung account. If a hacker has gained control of the account that you use on your phone, they may be able to access your phone’s settings and data remotely from another device. If possible, sign in to your account and change your password. If you’re locked out of your account or don’t remember your password, you’ll need to recover your account.
  4. If you find apps on your phone that you don’t recognize or remember installing, delete them right away. Strange apps could contain malware or spyware that hackers can use to access or mirror your phone without permission. Even if you installed an app yourself, it might be a good idea to delete it if it came from a disreputable source or you started noticing problems after you installed it.
    • On iOS, tap and hold the app icon. Tap Remove App, and then Delete App.
    • On Android, open the Google Play Store. Tap your profile picture → Manage apps & devicesManage → tap the app name → Uninstall.[1]
      • If you didn’t install the app through the Play Store, you can delete it by tapping and holding the app icon, then selecting Uninstall. Tap Uninstall again to confirm.
      • You can also go to Settings > Apps > select the app you want to delete > Uninstall.
  5. 5
    Check for and disable suspicious app security settings. A hacker might have given apps permission to access things like your microphone, camera, or location services. Go into your phone’s privacy and security settings and revoke any suspicious permissions. Here’s how to do it:
    • iPhone: Go to Settings > Privacy & Security. Tap each category to see which apps have access. Tap an app’s name to update its security permissions (or touch the toggle switch to turn off access).
      • For example, to revoke an app’s camera access, tap Camera, then toggle off the switch next to the app in the list.
    • Android: Go to Settings > Security & Privacy > Privacy > Permission manager. Tap a permission type, then select an app to change or revoke its permissions.
      • You can also check for and disable suspicious apps with admin privileges. Go to Settings and search for admin apps or special access apps. Tap Device admin. If you see any unfamiliar apps with admin privileges in the list, toggle them off.
  6. If you leave your phone in places that are easily accessible, you should update your passcode regularly. This is especially important if you have a passcode that is easy to guess, such as your birthday. Using a more complex passcode can keep others out of your phone.
    • On iPhones, go to SettingsFace/Touch ID & Passcode → enter your current passcode → Change Passcode.[2]
      • Check under the Unlock with Nearby Devices header and make sure no unfamiliar devices are listed there. If you see an unfamiliar device, toggle the switch next to it to the grey (Off) position.
    • On Android, go to SettingsSecurityScreen lock → enter your current PIN, pattern or password → tap a new lock type.
  7. If you're unable to get rid of the virus or malware, you'll need to reset your device.[3] Be sure to back up your iPhone or Android before resetting it.[4]
    • On an iPhone, go to Settings > General > Transfer or Reset iPhone. Tap Erase All Content and Settings. Follow the prompts to finish erasing your phone and set it up again.[5]
    • On an Android, go to Settings > Advanced > Reset options > Erase all data (factory reset). Follow the prompts to complete the reset process.[6]
      • If this option doesn’t work, there are several other ways you can attempt to reset or restore your Android. Learn more about your options here.
  8. Advertisement
Section 2 of 3:

Preventing Future Hacks

PDF download Download Article
  1. 1
    Require a password for screen mirroring (iPhone only). If someone is casting or mirroring your screen without permission, tightening up your iPhone’s security settings can help prevent this from happening again. You can also disable automatic screen mirroring/casting so you don’t share your screen by accident.
    • Go to Settings > General > AirPlay & Continuity. Scroll to the bottom and toggle on Require Password, then enter a password. This will help protect your phone from unwanted AirPlay connections.
      • At the top of the same menu, make sure Automatically AirPlay is set to either Ask or Never.
    • Unfortunately, there’s no built-in way to set a password for screen mirroring on an Android.
  2. Software updates include important bug fixes and, most times, stronger security features. As viruses and malware adapt, you should make sure your device stays updated as well.
    • On iOS, go to SettingsGeneralSoftware Update. Check for an update or upgrade and install it if it’s available. You can also enable Automatic Updates from this menu.
    • On Android, go to SettingsSystemSoftware updates. If an update is available, install it now. Typically, your system should update and install security patches automatically by default.[7]
  3. An antivirus app can easily detect malware and keep your device safe from infection. Be cautious of free services from unknown companies. Most trusted antivirus apps are paid services. Be sure to do your research before buying and installing any app.[8]
    • Some trusted antivirus apps include:
      • Norton Mobile Security
      • Bitdefender Mobile Security
      • McAfee Mobile Security
      • AVG Internet Security
    EXPERT TIP
    Brandon Phipps

    Brandon Phipps

    Technology Specialist
    Brandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.
    Brandon Phipps
    Brandon Phipps
    Technology Specialist

    The antispyware app I like best is Malwarebytes. It works on Android-type phones, including Samsung, and checks for malicious apps running in the background. You can run a manual malware scan for free, or pay to have the app continuously monitor your filesystem.

  4. 4
    Download apps from trusted sources only. Most apps that you get through your phone’s built-in app store (App Store on iPhone, Google Play Store or Samsung Galaxy Store on Android) have to go through a thorough security screening process before they can be approved. You’re unlikely to get a serious malware infection from any of these apps. However, you could run into trouble if you install third-party apps from alternative app stores or the web. Always do your research before downloading or installing an app from an unknown source.
  5. 5
    Install a VPN. VPNs create a secure connection between your phone and any website you visit, making it harder for hackers to intercept your data or track what you’re doing. They can also help prevent unauthorized screen mirroring connections. Most VPNs cost only a few dollars a month, and there are even some reputable free options.
    • Popular mobile VPN options include Surfshark, ExpressVPN, and NordVPN.
  6. 6
    Set up two-factor authentication (2FA). 2FA adds an extra layer of security to your devices. With 2FA enabled, anyone trying to access the account associated with your phone on a new device will have to enter a code. The code is typically sent to your phone number, email, or another trusted device. To set it up:
    • iPhone: Go to Settings, tap your name at the top, and select Sign-In & Security > Two-Factor Authentication. Enter a trusted phone number and tap Next, then enter the security code that’s sent to the number.
    • Android:
      • For stock Android phones, go to myaccount.google.com/ and tap or click Security & sign-in. Under How you sign in to Google, select Turn on 2-Step Verification. Follow the prompts to complete the process.[9]
      • On a Samsung Galaxy, go to Settings and tap your profile image at the top right side of the screen. Select Password and security > Two-step verification. Follow the prompts to verify your trusted phone number.
  7. 7
    Avoid unsecured public networks. Using an unsecured Wi-Fi network on your phone puts you at risk. Hackers can intercept your data or even infect your phone with malware and viruses over an unsecured connection. If you don’t have access to secure Wi-Fi, use cellular data or connect with a VPN to add an extra layer of security to your connection.
  8. Advertisement
Section 3 of 3:

Frequently Asked Questions

PDF download Download Article
  1. Yes—it's possible for someone to monitor your phone without your knowledge. While viruses are extremely rare to find on iPhones, it's not impossible. If you're using an Android device, you may be more susceptible to malware through file attachments, suspicious apps, and sketchy websites. However, this is very unlikely if you take the steps to protect your phone from viruses. This includes installing apps from trusted sources only, avoiding email scams, and refraining from clicking any suspicious links.
  2. 2
    What are some signs that my phone is being mirrored or hacked? Here are some common signs that your phone is being monitored:[10]
    • You have an abnormally high cellular data usage
      • Your phone battery drains quickly without much use
      • Your phone lights up during standby mode without any notifications
      • Your battery has a high temperature in standby mode
      • You hear strange noises (crackles, beeps, buzzes) during phone calls
      • You receive odd or threatening text messages from unknown numbers
      • Your phone has difficulty shutting down or restarting properly
      • You're experiencing more issues with lag and general performance
      • Your phone reboots without your consent
      • You see unusual activity in your email, social media accounts, or other accounts and apps linked to your phone
  3. 3
    How can a hacker mirror my phone? Hackers may gain access to your phone by taking control of linked accounts (such as your Apple Account or Google Account), which can allow them to access data on your phone or even control it remotely. They might also infiltrate your phone through malware and viruses or intercept your data over an unsecured network.
    • Malware and spyware can be spread through phishing attacks. For example, you can get an infection by clicking links in shady emails or texts, or by downloading untrustworthy apps.
    • Someone who has physical access to your phone could potentially install spyware on it or change your security settings.
  4. Advertisement

Expert Q&A

Ask a Question
200 characters left
Include your email address to get a message when this question is answered.
Submit
Advertisement

Video

Tips

Submit a Tip
All tip submissions are carefully reviewed before being published
Name
Please provide your name and last initial
Thanks for submitting a tip for review!

You Might Also Like

Advertisement

About This Article

Brandon Phipps
Co-authored by:
Technology Specialist
This article was co-authored by Brandon Phipps and by wikiHow staff writer, Megaera Lorenz, PhD. Brandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions. This article has been viewed 99,573 times.
How helpful is this?
Co-authors: 6
Updated: October 3, 2025
Views: 99,573
Thanks to all authors for creating a page that has been read 99,573 times.

Is this article up to date?

Advertisement