To make a long story short...
This past weekend I let a "friend" use my iphone to make a call. She disappeared with it for a few minutes. When she came back and gave the phone to me I saw that something was in the process of being installed.
I immediately put it in airplane and wiped it when I got home. I don't believe anything got stolen off my iphone...at least it was not given a chance to.
I should have confronted her right then and there but I was in a bit of shock. It caught me off guard that someone I knew for over 5 years would do that to me. Just glad that I was aware enough to do what I did do.
Now for my question...
Out of curiosity, I want to know what software was used to do that. Any info would be greatly appreciated.
This past weekend I let a "friend" use my iphone to make a call. She disappeared with it for a few minutes. When she came back and gave the phone to me I saw that something was in the process of being installed.
I immediately put it in airplane and wiped it when I got home. I don't believe anything got stolen off my iphone...at least it was not given a chance to.
I should have confronted her right then and there but I was in a bit of shock. It caught me off guard that someone I knew for over 5 years would do that to me. Just glad that I was aware enough to do what I did do.
Now for my question...
Out of curiosity, I want to know what software was used to do that. Any info would be greatly appreciated.