How to Tell if Someone is Tampering With Your Devices

By:  |  Category: Blog Tuesday, August 25th, 2020  |  No Comments
Tampering with device

If I looked at your phone I’d probably learn a lot about you, There are family pictures, texts, videos, documents and some of your highly private information. Our devices reflect our lives.

And because of this, securely locking down your devices has never been more important.

But what if your phone or PC is acting wonky and you suspect someone might be tampering with it?

Here are some ways to find out:

First: Check your PC’s recent items.

Usually if someone’s been snooping around on your device, they leave a trace. There are quick and easy ways to view recently accessed files, folders and even applications.

Here’s how you view your recent items:

On a PC:

  • Press Windows + R. Type in “recent” and hit enter. This step will show a list of files that were recently opened. If you see something on this list that you don’t remember opening, someone may have been poking around your computer.

On a Mac:

  • To see recent items, click on the Apple logo on the left-hand side of the menu bar. Hover your mouse over Recent Items. You’ll see the 10 most recent items accessed in three categories: Applications, Documents and Servers.
  • To see recent folders, open a Finder window. While the window is active, click Go on the menu bar. Hover your mouse over Recent Folders. Like Recent Items, you’ll see the 10 folders that were most recently accessed.

On an iPad:

  • Open the Files app. Tap Recents at the bottom of the screen.

On an Amazon Fire tablet:

  • Tap on the Docs button on the home screen to open the document library. Browse by Recent.

Check your web browser’s history

Another good place to check for someone snooping around is browsing activity. Although a tricky user can always use a web browser’s Incognito or Private mode or delete browsing history, it doesn’t hurt to check.

Google Chrome

  • Click the three vertical dots on the upper-right side of your Chrome window. Hover on History for the most recent sites visited. Click History to see a full list.

Mozilla Firefox:

  • Click the View history, saved bookmarks and more icon on the menu bar. (It looks like a row of books). Click on History.

Microsoft Edge:

  • Select the three-dot menu for Settings and more. Choose History, then Manage history.


  • Open Safari. On the Apple menu bar, click History > Show All History.

Review recent logins

To see all the login activities on your PC, use Windows Event Viewer. This tool will show you all Windows services that have been accessed and logins, errors and warnings.

To access the Windows Event Viewer, click the search icon and type in Event Viewer. Click Windows Logs, then choose Security.

This will show you a list of all the login events on your PC. Under the Event ID column, look for the number 4624 for standard logons, 4672 for administrative logons and 4634 for logoffs. Click the entry for additional details and check if another user has logged in to your system while you’re away.

On a Mac, you can use the Console tool to check if someone attempted to wake your computer while it’s locked or in sleep mode.

How to block others from using your computer or tablet

Lock your computer or tablet with a strong password when you’re not using it!

The lock screen suspends your activities and protects your work from would-be visual snoopers without completely shutting your computer down. On Windows, you can use the shortcut Windows key + L to lock your PC quickly.

On a Mac, you can use the shortcut Control + Shift + Eject (Control + Shift + Power button on Macs without disk drives) or Control + Command + Q to lock it quickly. You can also click on the Apple logo on the menu bar and select Lock Screen.

Also, update your password! Don’t use your dog’s name and birthday! Use something complex.


Keyloggers are programs that exist solely to capture information coming from your keyboard. They’re one tool hackers can use to steal your information, but companies, parents and even enterprising spouses can install them on your tech.

They come in software and hardware form and are not something to take lightly. Physical keyloggers are easy to hide inside computers, and you would never know. They can also sit on wires and cables, and if you don’t know what you’re looking for, you can easily miss it. Fortunately, these external keyloggers are limited in what they can do.

Hardware keyloggers might get in through a USB stick, cable or wall charger. Check your computer for anything that looks out of place or that you don’t remember plugging in.

Software keyloggers are harder to detect and will need a security scan to uncover. There are plenty of scans you can run if you suspect someone has gotten in your system.

If you need assistance with protecting your employees and your network give EnhancedTECH a call at 714-970-9330 or contact us at [email protected]

Leave a Comment
Read previous post:
flying car
Japan Says 3 Years Until We See Flying Cars in Tokyo

We’ve been waiting for this moment. The day when we can truly eliminate traffic not because people have finally learned...