How to tell if someone is stealing your WiFi and how to kick them off

How to see if someone is using your Wi-Fi

Even if your Wi-Fi network works flawlessly, it is still a good idea to see whether someone else is using your Wi-Fi from time to time. As a rule of thumb, you should have a password-protected Wi-Fi network at home. Also, only your devices should connect to it. That means all the gadgets your family uses. And the devices from friends that get on your Wi-Fi periodically.

To see all the devices connected to your home Wi-Fi, you must load the router app you might have used the first time you set up your Wi-Fi. Or the last time you changed the password.

You’ll need login credentials for this step, usually found on the router itself. If you changed the default password, you might have the new one stored in a password manager. Or maybe you know it by heart.

The bottom of the router will also contain an address that lets you connect to the device. You’ll have to load that up in a browser if your router doesn’t have a companion app. Log in, and then look for menus that mention “connected devices,” “wireless clients,” or anything of the sort.

As SlashGear points out, now comes the hard part. If you have many Wi-Fi gadgets on your network, it might be challenging to identify some of them. That’s because not all of them will have easy names like “iPhone” or “iPad.” Even if they do, you might have multiple devices connected to the network simultaneously.

This is the tedious point where you’ll have to determine what everything is. One way to do it is to turn the Wi-Fi off on all devices, no matter how much resistance you get from family members. Refresh the router tab or app to access the list of connected devices. Your computer might be the only device that’s still on Wi-Fi.

Anything else that’s still connected is probably a device from a neighbor stealing your Wi-Fi. Or several devices, as the person could connect all their Wi-Fi gadgets to your network once they have the password.

How to kick someone off your Wi-Fi network

Now comes the second part of your quest. Once you’ve found the culprit, you can go ahead and kick them off your home internet.

The simplest thing to do is to go to a different menu of your router management app. You’ll be looking for wireless settings or wireless security. And you’ll look for an option to change the password. Type the old password, and then type the new one. Save everything and wait for the device to apply the changes.

After that, you will have to reconnect all your Wi-Fi devices using the new password. You’ll want to make sure you remember this one. Once that’s done, you should be in complete control of Wi-Fi access.

There’s another way to solve the problem, per SlashGear. It involves kicking off the intruder from your Wi-Fi without changing your password.

Once you’ve identified your Wi-Fi devices, you’ll want to save the MAC addresses of each gadget you wish to connect to the network. In the router’s management app, you’ll want to find an option to filter MAC addresses. In there, you will insert all the MAC addresses that are allowed to connect. Each Wi-Fi device will have a unique MAC identifier.

After this step, only your gadgets will connect to your Wi-Fi network. Your neighbor will get connection errors, even if they still know your password. They’ll be effectively kicked out.

One more key Wi-Fi trick

The downside is that you’ll have to perform the same filtering task for your friends and extended family members who come over and want Wi-Fi access. A solution for that is setting up a separate guest Wi-Fi network that you only give to your visitors. Also, a guest Wi-Fi network comes in handy when neighbors want temporary access. You’ll be able to disable it once the agreed period expires.

Whatever version you decide to use, you’ll soon get rid of unwanted devices on your Wi-Fi network. The MAC filtering trick also is a sneaky way to turn off internet access to your kids’ gadgets.

Finally, if your Wi-Fi continues to experience connection and speed issues after you’ve cleaned it up, there’s a different problem you need to fix. You can upgrade the hardware or chat with your internet service provider about your connection.

Is Someone Spying on You?

https://www.msn.com/en-us/news/technology/quick-check-to-make-sure-no-one-is-spying-on-your-computer/ar-AAW1ObN?cvid=076f30f0c58d4ae387da3bfe83b27bd1

Quick check to make sure no one is spying on your computer

Afew decades ago, the average Joe didn’t have to worry about spies poking around their private life. Thanks to the internet, you now have to worry about spies snooping on your computer, tablet and smartphone. That’s why we’re sharing a few ways to ensure no one is spying on your computer.

Quick check to make sure no one is spying on your computer© Provided by Komando

Modern malware makes it easy for criminals to infiltrate your device. Tap or click here to remove malware from your computer. Troubleshooting can take a good chunk of your time, though.

That’s why you should first check for spyware on your machine. Luckily, we have a few valuable tips you can use to find out if someone is spying on your computer. Follow this simple guide to stop spies, creeps, and stalkers from monitoring you.

1. Check your apps through the Task Manager or Activity Monitor

It can be challenging to tell if someone is spying on your device. Spyware isn’t as direct as ransomware, which whips you into a frenzy so you feel forced to pay for your files back. Here are five essential steps to protect your computer from ransomware.

Spyware is subtle in comparison. It hides in your system, keeping track of everything you do. A program that spies on your computer can even hijack your webcam or microphone.

You should check your Task Manager if you’re on a PC or your Activity Monitor if you’re on a Mac. They give you an overview of all the apps running on your device. You can look over the list of apps and see which ones are slowing things down.

Checking your speed is an easy way to sniff out spyware

A sluggish computer is a dead giveaway that someone’s hitching a ride on your system. If it suddenly slows down, try to investigate the issue. Sure, maybe the slowdown is due to an innocuous reason like clutter. But you don’t want to take the risk.

Malware tends to use up a lot of resources. It’s designed to run your system dry, which means your programs can start to lag. Your computer will start working overtime to handle these unwanted programs, which means your device may begin to heat up.

PC users: Follow these steps

Check the Task Manager to see the processes your computer is running. Just hit CTRL + SHIFT + ESC to open the Processes tab. Here you’ll see how many central processing units each program uses.

You might see a program that uses almost 100% of your CPU. If you don’t recognize the name, do some research to see if it’s a legitimate app. Then, reset it. If you notice performance decrease again, you just found your spyware app.

Mac users: Follow these steps

Check the Activity Monitor to see the processes your computer is running. Just hit Command + Spacebar to open Spotlight Search. Then, type Activity Monitor and press Enter. If you see an app that uses too many resources, look it up, reset it and see if your performance decreases.

Maybe you checked the Task Manager or Activity Monitor and didn’t find anything. In that case, here’s another way to make sure no one is spying on you.

RELATEDSneaky new malware avoids detection – How to check your computer

2. Be on the lookout for programs that start randomly

Always be on the lookout for strange activities. For example, if an app launches itself out of the blue, don’t write it off. You may think, “Maybe I accidentally clicked on it?” or “It could be a bug.” Don’t give any strange behavior the benefit of the doubt. Take it as a warning sign.

Let’s say you forbid all apps from opening upon startup. If a window briefly appears before flicking out of existence, that’s a sign that a spyware program is loading itself. They’re designed to disappear, so you don’t notice them, but they might accidentally show themselves in this way since they need to load.

That’s why heading to Task Manager on a PC or Login Items on a Mac is helpful. They let you look over every app on your computer. Think of these programs as ingredient lists on the side of a food package. You can root out the bad stuff for your health or, rather, your computer’s health.

Here’s how to change startup apps on a PC:

  • Click the Start menu.
  • Select Settings (cog icon) and click Apps.
  • In the left menu, click Startup. It should be the last option.

The Startup panel displays all the apps installed on your machine. If Windows has measured the impact of that app on your PC, you will see a rating next to it. Options include No impact, Low impact, Medium impact, and High impact.

An app with a high impact can slow down your startup time. Go through the list and determine which apps you don’t need immediately after startup. Toggle each slider next to the app to turn it on or off.

Here’s how to change startup apps on a Mac:

  • Click on the Apple menu and navigate to System Preferences.
  • Click Users & Groups.
  • Select your User Account, then click Login Items on the top right.

Here you’ll see a list of the applications that open automatically when you log in.

To prevent an app from running automatically, click Remove a login item. Then select the app’s name that you want to block and click on the Remove button below the list.

You can use the checkbox to hide items you still would like to launch. To add a new item, hit the plus symbol under the list and find it on your computer.

Here are a few other ways to identify unwanted programs.

3. Update your devices regularly

Another good way to ensure no one is spying on you is to keep your computers updated. We get it: Constantly updating them can be a drag. But it’s worth it for the sake of longevity.

If you want your computers to last, you must ensure they’re safe. And the easiest way to protect them is by taking advantage of the ever-evolving security tools that come out for free updates.

Cybersecurity experts are always keeping their ears to the ground. They know about the latest hacks, exploits and more. Thus, they’re always working hard to fix these issues.

They release these fixes in updates, so you’re missing out on essential protection if you don’t upgrade your system. Tap or click here for a few emergency updates that anyone with Apple devices should know about.

To update your Mac:

Click the Apple icon from the menu bar at the top of the screen and click System Preferences > Software Update.

To update your PC:

Click the Start Menu and open Settings, click Update & Security, then click Windows Update. From there, you’ll be able to see if updates are available for download. If an update is available, click Download and Install. If you don’t see an available update, click Check for Updates to force the process.

Arizona’s 5 Best Ghost Towns

https://mwg.aaa.com/via/places-visit/arizona-ghost-towns?ajs_uid=736e910e2a3f0594d99694d096d2b36b&activity_id=EMC_MSHP_Newsletter_AZ_100922

Explore these abandoned towns around the state.

By Keridwen CorneliusPublished September 29, 2022

A wooden sign over the road in Vulture City ghost town in Maricopa County, Arizona.
Vulture City ghost town in Maricopa County, Arizona.

From an eerily abandoned copper mining outpost to a deserted camp where visitors can stay the night, these time-capsule towns offer a fascinating view of Arizona’s bygone days.

Oatman

Sometimes called a “living ghost town,” this Route 66 town in Northwestern Arizona is home to around 100 people. But that’s a nugget of its population in the 1920s and 1930s, when 10,000 people wandered the dusty streets. Thanks to repeated gold strikes between the 1860s and 1910s, this boomtown received influxes of prospectors and businesspeople. But like many mining towns, Oatman suffered the vagaries of ore prices, and during WWII, the mines were deemed non-essential to the war effort and closed. For a while, the Mother Road helped Oatman thrive as a tourism hotspot. But in the 1950s, when Interstate 40 bypassed Oatman, the town was left in the dust.  

Still, Oatman is worth a visit for its fascinating cast of characters. Clark Gable and Carole Lombard honeymooned here at the Durlin Hotel, now called the Oatman Hotel, and travelers can visit the bar, restaurant, onsite museum, and honeymoon suite. Every day, crowds gather in the street to watch the Oatman Ghost Rider Gunfighters act out a heist and shootout. And the most popular locals are the wild burros, who are descended from donkeys brought to town by miners and now wander the streets like they own the place.

Inside living quarters in a historic building in the Vulture City ghost town in Arizona.
Inside a building in Vulture City.

Vulture City

Vulture City is filled with photogenic rusty trucks, weathered wooden buildings, and rumored paranormal activity, set against a backdrop of saguaros. This settlement near Wickenburg was established during the Civil War to support Vulture Mine, Arizona’s most productive gold mine. The population quickly swelled to 5,000. But when World War II broke out, the mine was shuttered to ensure resources were directed toward military efforts. The town was soon abandoned.    

Today, some of the stone edifices and artifacts have been faithfully restored. Visitors can safely poke around the ​​assay office, cookhouse, brothel, post office, and prospector Henry Wickenburg’s original home on a self-guided tour or a seasonal (mid October through mid May), weekend guided tour. General admission for all visitors is $15 per adult.

Swansea

Rocky, rough, and punctuated with piles of mine tailings, the road into Swansea feels as forgotten as this now-deceased town. In the 1860s, copper mining started in this barren part of Western Arizona’s Buckskin Mountains. The subsequent settlement was named after Swansea, Wales, which was both the hometown of founder George Mitchell and the destination where Arizona’s refined ore was shipped. 

In the early 1900s, a railroad brought buzzing activity to this remote outpost. The 750-or-so residents frequented Swansea’s saloons, barbershop, auto dealership, and moving picture house. But the mining companies began to sputter, and the Great Depression sounded the death knell for Swansea. Today, the town is preserved by the Bureau of Land Management. Visitors can stand atop grate-covered mine shafts, see an earthquake-damaged smelter, and roam around the workers’ cottages—shells of buildings where, shockingly, up to six miners shared the tiny space.

Signed dollar bills line the walls behind the bar at Superstition Saloon & Restaurant.
Signed dollar bills line the walls at Superstition Saloon & Restaurant.

Tortilla Flat

Just down the road from stunning Canyon Lake, where standup paddleboarders and Dolly Steamboat riders cruise between golden cliffs, lies Tortilla Flat, population: six. Established in 1904 as a freight camp for laborers constructing Roosevelt Dam, the town has served as a stagecoach station and lunchtime pit stop for President Theodore Roosevelt. Located an hour from downtown Phoenix, this leisurely outpost is popular with day trippers looking for a Western vibe and watery adventure. 

At the Superstition Saloon & Restaurant, diners can hop onto saddle bar stools and sip sarsaparilla while feasting their eyes on the estimated $350,000 worth of signed dollar bills papering the walls. For dessert, pop into the Tortilla Flat General Store for a prickly pear gelato and mosey down the boardwalk. Then head to the mini museum to learn about the town’s colorful history, from fires to filmmaking.

Kentucky Camp

Nestled in the “sky island” mountains north of Sonoita, Kentucky Camp offers a rare chance to spend the night in an abandoned ghost town. The U.S. Forest Service rents a restored adobe cabin onsite, giving guests an intimate experience with deserted buildings set amidst the silence of the grasslands and the grandeur of a star-filled sky.   

After gold was discovered in the area in 1874, around 500 miners rushed in, depleting the deposits within a decade. In 1904, Kentucky Camp was built as the headquarters of the Santa Rita Water and Mining Company, which aimed to employ hydraulic gold mining to extract more ore. But the venture fizzled out when, a year later, the camp’s designer and chief engineer mysteriously plummeted to his death from a window in Tucson. Today, visitors can explore the restored headquarters building, relax on the porch, and mountain bike or hike along the Arizona Trail.

UP NEXT:Driving Haunted Route 66

Airline Customer Service Dashboard

https://www.transportation.gov/airconsumer/airline-customer-service-dashboard

The U.S. Department of Transportation has created a dashboard to ensure the traveling public has easy access to information about services that U.S. airlines provide to mitigate passenger inconveniences when the cause of a cancellation or delay was due to circumstances within the airline’s control. A green check mark on the dashboard means an airline has committed to providing that service or amenity to its customers. A red “x” means the airline has not made that commitment. However, airlines with a red “x” may provide these services and amenities in some instances in their discretion.

https://explore.dot.gov/views/AirlineCustomerCommitments/AirlineCustomerCommitments?:embed=y&:isGuestRedirectFromVizportal=yFviews/AirlineCustomerCommitments_MH10/AirlineCustomerCommitments?:embed=y&:showVizHome=no&:host_url=https://explore.dot.gov/views/AirlineCustomerCommitments/AirlineCustomerCommitments?%3Aembed=y&%3AisGuestRedirectFromVizportal=yF&:embed_code_version=3&:tabs=no&:toolbar=no&:showAppBanner=false&:display_spinner=no&:loadOrderID=0

Please click this link to download an accessible version of the dashboard.

These ten large U.S. airlines and their regional operating partners, which operate flights for them but do not sell tickets, account for approximately 96 percent of the domestic scheduled passenger air traffic.

Use the above dashboard to learn about the amenities that the U.S. airline that you are flying on has promised to provide should there be a controllable flight cancellation or delay. You can also use the dashboard to compare amenities that the airlines commit to provide in the event of a controllable flight cancellation or delay when deciding which airline to fly.

A controllable flight cancellation or delay is essentially a delay or cancellation caused by the airline. Examples include: maintenance or crew problems; cabin cleaning; baggage loading; and fueling.

Airlines are required to adhere to the promises that they make in their customer service plan, including commitments to care for customers in the event of controllable delays or cancellations. The Department will hold airlines accountable if they fail to do so.

Remember these commitments do not impact your entitlement to a refund. If an airline cancels a passenger’s flight or makes a significant change in the flight, regardless of the reason, airlines are required to provide a prompt refund to a ticketed passenger, including those with non-refundable tickets, should the passenger choose not to accept the alternative offered, such as rebooking on another flight. Learn more about your right to a refund. If you have a problem obtaining a refund that you believe that you are entitled to receive, you may file a complaint with the DOT.

See below for detailed information about airline customer service commitment plans.

Airlines’ Customer Service Plans

How to fix audio problems on your Windows PC

https://www.pcworld.com/article/491036/how-to-troubleshoot-audio-problems-with-your-pc.html?huid=76887c5a-a2c3-4cc5-bb6f-0c3759430042

For all its positives, Windows sometimes acts in unexpected ways—like a sudden lack of audio. If your computer abruptly stops playing sound, try these easy steps to fix the issue:

No sound in one app

  1. First, reboot your computer.
  2. Confirm the program’s volume isn’t turned down or muted. In browsers like Chrome and Firefox, each tab can be muted individually—right-click a tab to see its status. (The option will say “Unmute tab” if currently silenced.)
  3. If you still can’t hear anything in this program, try uninstalling and reinstalling it. Before doing so, first back up any data and/or write down how your settings are currently configured, as applicable.Note: For paid software, your license for the program may be tied to a specific version—if that’s the case, you may need to do a little hunting to find its installation program on the vendor’s website. This same advice applies if you just prefer your version of the app over the current one.

No sound at all

Playback device selection in the Windows taskbar for Win 10 and Win 11
First thing to check: The audio output device. Windows can sometimes change it to a different source unbeknownst to you. (To view this image full-size, right-click on it and choose “Open in new tab.”)

PCWorld

  1. First, check to make sure Windows is using the correct device for speaker output by clicking on the speaker icon in the taskbar. (Sometimes Windows will switch output to a different device, unbeknownst to you.) At the top of the pop-up window, you’ll see the name of the speaker currently in use—e.g., Speakers (2-Anker PowerConf). Click on that name to switch to the proper device, if applicable. If using external speakers, make sure they are powered on.
  2. Reboot your computer.
  3. Verify via the speaker icon in the taskbar that the audio is not muted and is turned up.
  4. Ensure that the computer isn’t muted via hardware, such as a dedicated mute button on you laptop or keyboard. Test by playing a song.
  5. Right-click the volume icon and click Open Volume Mixer. Ensure that all options are on and turned up.
  6. Internal speakers still not working on your laptop? Plug headphones into the audio jack and test again. If the headphones work, remove them to continue troubleshooting the internal speakers.
  7. For desktop systems with speakers plugged into the 3.5mm jack, try a USB speaker or USB headphones. (Or visa versa.) If the alternative device works, remove it to continue troubleshooting the initial set of speakers. (See our roundup of best budget computer speakers if you are in need of a new set.)
  8. Right-click the volume icon again and choose Open Sound settings (Windows 10) or Sound settings (Windows 11). For Windows 10, find Related Settings in the window that opens, then click on Sound Control Panel. For Windows 11, scroll down to the Advanced section of the window that opens, then click on More sound settings. For both operating systems, a new, smaller window labeled Sound will appear. Click on the Playback tab, and then confirm that your audio device (likely “Speakers”) has a green checkmark next to it. Then click Properties and make sure that Use this device (enable) is selected.

If your sound still doesn’t work by this point, you may have a missing or corrupt driver for your audio controller.

  1. Uninstall the driver. Open the Device Manager (type device manager in the taskbar search box), go to Sound, video and game controllers, select the audio controller for the device that’s malfunctioning, and press the Delete key.
  2. Reboot the system and allow Windows to reinstall the driver, which it should do automatically. If it doesn’t, download the driver from your PC maker’s site or audio card manufacturer’s site, and reinstall it manually.

Author: Alaina Yee, Senior Editor

Alaina Yee is PCWorld’s resident bargain hunter—when she’s not covering PC building, computer components, mini-PCs, and more, she’s scouring for the best tech deals. Previously her work has appeared in PC Gamer, IGN, Maximum PC, and Official Xbox Magazine. You can find her on Twitter at @morphingball.

Recent stories by Alaina Yee:

Local Locksmith

I just want to say that Bob Danelz, SaddleBrooke Locksmith, is awesome. He lives in SaddleBrooke and is a true asset. I work for Beth Fedor, Realtor and we had a situation where the locks needed to be rekeyed ASAP so I called Bob. 520.444.3351. He went over first thing this morning, rekeyed the locks and did a perimeter check only to find that one of the sliding doors had been left unlocked so he checked all doors and windows before leaving the home to ensure it was secure.

Some Intel CPUs are breaking Chrome and Edge — here’s what you can do

© Provided by Tom’s GuideIntel Alder Lake mobile CPU promo image

Intel is aware of the issue and posted about it on its website. The company says that recent Intel UHD Graphics 770 drivers for Alder Lake CPUs are causing Chromium-based browsers to “lag severely.” Browsers behave as if they’re “semi-frozen,” with click response times as slow as two seconds. Scrolling is also “delayed and choppy.” 

Intel said the issue can happen by opening many tabs at once or scrolling and clicking around. Using a mechanical hard disk drive (HDD) also causes problems.

So far, this problem is linked to machines with both Alder Lake CPUs and UHD Graphics 770 integrated GPUs. Eighteen desktop and laptop CPU models released between late 2021 and early 2022 are directly affected. This ranges across the i5 through i9 lines. There’s a full list of models with UHD 770 integrated GPUs that you check out to see if you’re at risk.

Intel details how affected users can resolve this problem, suggesting users update the browser and Windows to their respective latest versions. Users should also update the graphics driver with a clean install, along with disabling hardware acceleration on the browser or switching from an HDD to an SSD.

We expect issues to pop up with new tech, but this particular problem seems especially troublesome. After all, Chromium browsers — specifically Google Chrome — are the most widely used on Earth. Unlike AMD CPUs slowdowns in Windows 11, you’ll actually see these slowdowns since you’d only notice the latter if you were looking at your CPU speeds. 

Hopefully, Intel rolls out a fix sooner rather than later. The company certainly doesn’t need this hanging over its head before the global launch of its Intel Arc Alchemist desktop GPUs, which are expected to arrive in late summer.

Find out who’s calling you from an unknown or blocked number

Star 69

Unwanted calls can be so frustrating. You’ll find yourself typing something like “no caller ID how to find out who called” or “how to find out no caller ID” into the search bar to get answers.

That can take a long time, though. When mysterious phone calls clutter your call log, this phone number lookup trick helps you identify the unknown number calling your device. Follow these steps, and you won’t have to grimace when you look down at your phone and see that unknown number.

You may have heard of or used *67 to conceal your number from someone you called. Did you know there are similar numbers you can dial to respond to these anonymous callers?

The first one is *69, which traces the number of the last person who called you. It works even for anonymous or hidden calls, so you can get the phone number and the exact time they called.

Once you have that hidden phone number, you can block it on your phone, so it can’t call you anymore.

RELATEDTap or click here for ways to block unwanted robocalls

Dialing *69 may also provide you with the option to call a number back right then and there, so if you want to confront a scam or spam caller, you can. But don’t expect to get any information from them or be removed from their list.

Another number you can use to trace a call is *57. This is the number to use if you believe a scam or spam caller is harassing you. *57 gets you the phone number and call information *69 does, but it goes above and beyond.

When you dial *57, the information you obtain is passed along to the police. Your phone service will log a *57 call in a special way, so authorities can more easily locate whoever is harassing you and arrest them.

You’re also meant to call the police right after a *57 call with a written log of the calls from your harasser so that the police can act. If you feel an anonymous caller is contacting you too often, it’s worth using this number; otherwise, stick with *69.

Note: Many phone companies charge extra for *69 and *57 calls, so don’t be surprised to see a few additional charges on your bill if you use them. Also, not every phone company provides these services. Check with yours to see if it does.

Contact your phone provider

If you need help with a consistent spammer, you can contact your provider directly for caller ID services. You might even be able to find out who blocks your caller ID.

More importantly, you can also ask for Anonymous Caller ID on a particular caller. This can help you ID spammers and let you block them on your own if you don’t want to pay for a subscription. Tap or click here to see how the top carriers are fighting robocallers.

When inquiring about your carrier’s services and pricing, remember there are also third-party apps you can utilize.

Get an app

There’s an app for everything, including identifying unknown or blocked numbers as they come to your phone. (We don’t recommend relying on Siri’s suggestions.) One of the most popular apps is TrapCall. This app is available for both iOS and Android devices.

© Provided by KomandoFind out who’s calling you from an unknown or blocked number

It tells you the number of anonymous calls in real-time and can automatically block spam for you. It does notify you when it blocks a call, just in case you want to call back. But you can create a blacklist, and when they call, the app plays a message claiming your number was disconnected.

And fake numbers aren’t a problem, either. TrapCall forces callers to identify themselves before letting their calls go through. Get your first week of TrapCall free. Then it’s $3.95 a month for a single user or $7.95 for the premium package.

The premium package allows you to record incoming calls and the option to play a warning message to make sure whatever you do complies with your state’s laws. The warning is not mandatory.

There are other caller ID apps out there, as well, like Truecaller. Tap or click here to learn more about Truecaller.

For all those unknown callers

The goal of identifying unknown phone numbers is to block those you don’t want to speak to. If you have an iPhone, you can take a more extreme step and automatically block numbers that aren’t in your Contacts list.

This feature is called Silence Unknown Callers. Calls from numbers not in your Contacts will still go to your voicemail and appear in your recent calls list, but your phone won’t ring for them.

If you get a lot of unknown calls, this might be the feature for you. Just follow these steps to turn it on:

  • Go to Settings, then Phone.
  • Scroll down to the Silence Unknown Callers heading and select it.
  • Slide the toggle next to Silence Unknown Callers to the right to enable the feature.

A similar feature exists on the Samsung Galaxy. To activate that:

  • Open the Phone app, and tap the More icon at the bottom of the screen – it’s the one that’s three verticle dots.
  • Tap on Settings, then Call blocking.
  • Turn the Block anonymous calls switch to on.

If you have another type of Android, you can download the Should I Answer? app for a version of the Silence Unknown Callers feature.

Learning who is calling you anonymously can save you the headache and potential exploitation of spam and scam calls. Tap or click here for information regarding the Anti-robocall law.

Whether you have iOS or Android, use any of the above methods to ID hidden phone numbers and block them. Or block unknown numbers altogether. Whatever your method, you’ll be keeping yourself safe – and sparing yourself some annoyance – which is 100% worth the effort.

Bonus: How to tell if it’s a spam number

An easy way to find out is to Google the number. It’s kind of like a reverse image search.

By inputting the phone number into the search bar, you may see that it has been reported before. People on forums will often share stories about scammy calls, posting the scammers’ numbers for all the world to see.

If your Google search leads you to a forum of people discussing spammers, that’s a red flag. However, if the number shows up on a company website, that means the phone number may be from a legitimate company.

Notice that we said it may be from a legitimate company. Remember, caller ID spoofing is a huge problem. If a number calling you turns out to be from a company, that doesn’t necessarily mean the company itself is calling you.