Discover the Anyleads suite | Find emails, verify emails, install a chatbot, grow your business and more!.

Why am I getting someone else's email?

Why am I getting someone else's email?

Welcome back to Tech 911, Lifehacker’s weekly tech-advice column that’s always looking to solve your challenges—geeky, strange, or otherwise. This week, we're taking a look at a case of mistaken identity.

We all know the feeling when someone sends us something via email and it looks like they sent it from our own account (or even worse, their own). It happens more often than you might think—and more frequently with Gmail users who have multiple accounts set up across different services. And while there's not much you can do about it aside from deleting said messages (which will also erase any attachments), we wanted to take a closer look at what's going on behind the scenes so you can make sure these types of things don't happen again.

First off, let me say this: If you suspect that someone may be sending you emails that aren't coming from where you expect them to come from, check out our guide to seeing which mail servers are involved in the process. You'll get a lot of information by just doing a search on Google using "whois" as part of the query string. Once you've got some basic info, try contacting whoever owns the domain name listed in the WhoIs results to find out if it's actually yours.

But in most cases, it won't matter whether the sender was able to verify ownership because the email service provider you use likely doesn't care either way. Instead, they only want to ensure that every email you receive comes from its intended recipient. So, what exactly goes wrong here?

Why are people getting emails I didn't send?

When two parties share a common email address but one party signs up for a new web app or service without verifying their email address first, it's possible for those addresses to get mixed up. For example, if you created an Apple ID before signing up for iCloud, then you could accidentally start receiving emails meant for someone else with the same username. The same thing happened last year after Microsoft announced Windows 10, causing many people to receive messages intended for other Windows 10 users.

While most companies offer a means to change your password or request a verification code upon creating an account, some don't require this step. That said, you should still double-check your settings and see if you need to verify yourself when setting up a new account. We recommend following these steps to confirm your email address:

Open a new tab or window in Safari and type Select Account & Privacy under Email, Username, Password & Security. Then select Signing In and scroll down until you find Change Your Passcode. Enter the current passcode for your device and click Continue. Type in your old password and hit OK. Click Next. Now enter your desired password strength rating and click Save Changes. Finally, tap Update next to Signing In.

If your current email address is linked to an existing Apple ID, you can access your profile through Settings > [Your Name] " Mail, Contacts, Calendars. From here, you can link additional devices and view related activity. Alternatively, you can click Edit button beside the primary email address and choose Delete My Mac ID.

You can also manually delete your Apple ID by visiting Just log in with your credentials, follow the instructions to confirm you really mean it, and voila! All traces of your Apple ID vanish forever. However, since you'd lose access to everything tied to your Apple ID including apps, music, photos, purchases, and more, we highly advise against this option unless absolutely necessary.

In addition to linking your Apple ID to another email address, you can create a second account entirely. To do this, open Settings " Mail, Contacts, Calendars. Scroll down to Manage Accounts and click Add Another Account. Follow the prompts to fill in the fields and save changes. When prompted, you can also add a secondary mobile number to keep track of incoming calls and texts.

Once you've done both of these tasks, you should no longer be receiving emails from anyone else signed up for the same service. But what if you already received those emails and now want to block the sender? Unfortunately, there's nothing you can do about this besides blocking the entire email address instead of individual recipients.

How do I stop receiving duplicate emails in Yahoo!?

Yahoo! provides a handy feature called Spam Filtering that lets you customize each message based on several criteria. First, you must turn on the filter within Preferences " Junk E-Mail Options. Afterward, click Advanced Filter Setting at the bottom of the page to configure custom filters. Here you can specify keywords or phrases for certain categories such as personal, business, and promotional. You can also include specific words or characters in the subject line like "," ".yahoo.", etc., depending on what kind of content you want to exclude.

Finally, you can adjust the amount of time between each check for suspected junk e-mails. As long as you don't exceed the daily limit, you shouldn't ever miss anything important. Of course, we suggest keeping the default of 30 minutes because it gives you ample time to catch up on whatever other work you need to complete. Otherwise, you'll end up missing a whole day worth of emails.

Why am I getting emails to an email address that isn't mine?

This particular scenario usually occurs when someone tries to sign up for an online account with your name and email address. They probably found it somewhere online and thought it would be easy enough to steal away your hard earned data. While you can easily prevent others from accessing your account with passwords alone, you can never fully protect yourself from a determined hacker. So, what should you do? Well, luckily, there's an easier fix for this problem.

As mentioned above, whenever you create an account anywhere, you should verify your email address by entering a unique security question. These questions generally consist of four separate parts with three answer options per section. For instance, your question might read like this: What city were you born in? Answer: Miami. Do you live near the beach? Answer: No. Are you a dog person or cat person? Answer: Yes. Have you been married twice? Answer: No.

The best way to tackle someone stealing your identity this way is to create answers that are difficult to guess. Try to avoid answers like, "I love cats!" or "My favorite color is blue." Instead, go with something more obscure like, "What's the capital of France?" or "Where did you grow up?". Ideally, you want to throw in a few unrelated details that are unlikely to match up with anyone else's life story.

For added protection, you can also opt to activate Two Factor Authentication. This requires you to input a 6 digit code generated by SMS text messaging once you login from an unrecognized location. By adding a layer of security between you and the hackers, you significantly reduce the chances that they'll gain access to your account.

As far as stopping unwanted emails from being delivered to your inbox, you have a couple of options. One involves turning off email notifications completely. On iOS, head over to Settings " Notifications and toggle Off Email Alerts. With Android, navigate to Settings " Notification Access and disable Show Previews. Both methods should cut down drastically on the volume of spam you receive.

Another option is to simply forward all emails marked as SPAM directly to trash. Open the relevant email in your browser and right-click anywhere within the body of the message. Choose Forward Message and paste in the URL provided by your ISP, which is typically located in the footer of your confirmation email. Hit Send to immediately move the message to the Trash folder.

Lastly, if you believe someone is impersonating you, contact your bank or credit card company to alert them of fraudulent charges made with your information. Be aware though that sometimes banks themselves will charge fees for reporting fraud. Depending on the situation, you might be responsible for paying these costs.

Why am I getting emails from someone else Yahoo!?

It seems pretty obvious that someone tried to register for your Yahoo! account with your email address. Since you haven't verified yet, they ended up using your real name and email address. Thankfully, there's plenty you can do to prevent this from happening again. Keep reading below to learn what steps to take.

Welcome back to Tech 911, the weekly column where we take a deep dive into our most pressing questions about technology and geekery. If there was one thing this past week taught us it's that sometimes even those who know best can't help but feel helpless when faced with an unusual challenge like dealing with someone stealing their Apple ID credentials. As such, today we're going to tackle the question of "Why does someone else have my email?" We'll also explore some common scenarios where people find themselves accidentally signing into accounts they don't own as well as some solutions to stopping others from accessing them.

If you've ever had trouble figuring out why someone else might be accessing your account (or worse, sending messages from your account), then welcome to our new series covering everything related to security, privacy, and anonymity. In each installment, we'll cover different ways that people may try to access your information without permission, offer tips on protecting yourself against these threats, and finally explain some basic steps you should follow if you suspect someone is using your info inappropriately. For now though, let's talk about why someone might be able to access your email account in the first place.

Why is someone else's email on my IPhone?

It sounds ridiculous, but every once in awhile, you're going to run across something so bizarre that it makes no sense whatsoever. Case in point: earlier this month, Reddit user u/The_Horseman posted a screenshot of his wife's Gmail inbox that looked exactly like his own. The photo shows all of her recent emails sent from within Google's web interface rather than through their mobile apps. It's unclear why she would have done this, although he suspects it could have been an attempt to spy on him by someone she knows. After the post went viral, however, it turned out that u/The_Horseman wasn't actually married to his wife—he just used a very similar name. He explained that he'd created an alias for himself after finding the site Uncyclopedia, which allows users to create profiles under pseudonyms. His username happened to sound pretty close to hers. So while the incident might seem farfetched, it turns out that you absolutely cannot trust anyone with your email password.

Why does someone else's email come up on my iPhone?

As weird as the previous scenario was, things can become much stranger when they involve your iPhone. Even if you never use your phone for online banking, shopping, or any other sensitive activity, someone could still easily gain access to your account simply because you happen to share your login details with a friend or family member. You shouldn't assume that the only way someone will be able to log into your iCloud account is via Safari, either. Some services allow you to authorize applications directly from within iOS settings, meaning that someone could install a browser extension or app that lets them access your account without having to enter your password manually. And yes, despite rumors to the contrary, this method isn't limited to Facebook. Check out our guide to preventing unauthorized access to your iCloud data for more specifics.

Why am I receiving someone else's emails?

In addition to being targeted by scammers who want to steal your personal information, you may occasionally end up signed into someone else's service. Maybe you got invited to join a group chat, shared your Apple ID with a colleague, or logged into a website using your Android device instead of your desktop computer. Whatever the reason, it's important to understand that you're not alone here. Anyone can potentially see your public profile page on sites like Facebook, Twitter, LinkedIn, and Tumblr. And depending on the permissions you give to third parties, they may be able to view private content too. Thankfully, there are several simple steps you can take to ensure that nobody sees anything off limits.

How do you get rid of other emails on iPhone?

Since you probably won't need to worry about another person logging into your account anytime soon, you can put together a few quick fixes to prevent future mishaps. First, make sure that you're not sharing your Apple ID with anyone. While many services support two-factor authentication, which requires both a code generated from your passcode screen and a verification message sent over SMS, you can disable 2FA completely by following our instructions on changing your Apple ID password. Second, enable Two Factor Authentication whenever possible. On iOS devices, you can set up a one time PIN used exclusively to authenticate into services requiring 2FA, as long as you remember the number correctly. Finally, keep your passwords safe! Avoid storing them anywhere besides secure notes on your smartphone or laptop. That means no writing down URLs or addresses, and definitely don't store them in plain text files. Instead, make good use of LastPass, 1Password, Dashlane, Keeper, etc., to generate unique passwords for every site and service you use. With these safeguards in place, you should no longer have to worry about someone hijacking your accounts.

And hey, if you think you're seeing someone else's email on your iPhone or iPad, check out How Do I Stop Someone From Signing Into My Account Using Their Phone Number.

What is this and why did it happen?

This week, something happened on Twitter and Reddit that sent me scrambling for answers. A popular image hosting website called Imgur had been hacked by someone claiming to be The Dark Overlord (TDO), a person who has claimed responsibility in the past for several high profile data breaches.

The hacker claims to have uploaded over 150GB worth of stolen files from various websites including Dropbox, Amazon, and PayPal. According to TDO himself, he plans to release more information publicly later this month. In the meantime, you should probably change any passwords you've used anywhere online since 2014 because someone may have already accessed those sites using your password.

As far as I'm aware, no major news outlets are reporting this story yet so if anyone knows anything new please share it in the comments below!

How do I protect myself against this kind of attack?

Use unique passwords everywhere

Don't reuse passwords across different services

Enable two-factor authentication whenever possible

Can these types of attacks continue indefinitely without being noticed?

If yes, what could future hackers gain from knowing how to exploit this type of vulnerability?

Welcome back to Tech 911, Lifehacker's weekly tech-advice column that's always looking to solve your challenges—whether they're geeky, strange, or otherwise.

This week, we'll be tackling the question, "Why am I getting someone else's emails?" It may seem like a simple one, but there can be some pretty serious repercussions when it comes to personal information and privacy. Let's take a look at some situations where you might find yourself asking this very same question.

Why am I getting my wife's emails on my iPhone?

You've just met an attractive woman who seems nice enough (in fact, she could probably use a friend right now). You exchange numbers and start texting her. The next thing you know, you have a new bestie! But wait…she doesn't even own a smartphone! Not only does she have no idea about your relationship status, she also has absolutely zero clue about your cell number. How did she end up having your contact info? And more importantly, how long will it stay on her device before you decide to delete her out of sheer frustration?

The answer lies somewhere between those two questions. Your wife's phone was likely compromised by a malicious app installed through a phishing attack. If you think your spouse's phone is safe, check their browser history. Did they visit any suspicious sites lately? Look closely at the apps they download. Does any of them sound familiar?

If you suspect something fishy going on, make sure you wipe all data off of both devices as soon as possible. We'd suggest using a utility such as CCleaner Portable ($3) to remove anything left behind. Also, don't give out your old phone number unless you really want it to stick around. Instead, ask your new girlfriend to add you on Facebook so you can send each other messages via Messenger instead.

Why am I getting someone else's emails Yahoo?

It sounds silly, but there's actually quite a bit of truth to it. In most cases, hackers aren't looking to steal your credit card or bank account details. They're after much smaller amounts of sensitive information, which makes these types of attacks extremely difficult to detect. However, once you've been hacked, it's unlikely that you'll ever regain access to your accounts without changing passwords and setting security measures.

So what happens when a hacker gets hold of your username and password combination? Well, they're able to log in and wreak havoc across multiple websites. Some of the easiest ways to fall victim to this type of scam include logging onto social media profiles, signing up for newsletters, checking your bank statements, buying things online, and paying bills online. Luckily, however, scammers usually target individual users rather than big companies. So while you might see a bunch of fraudulent charges appear on your account, you're still protected against identity theft since the money never leaves your wallet.

Another way hackers sneakily obtain your login credentials is through malware that infects your computer or mobile device. While this isn't nearly as common as phishing scams, it's definitely worth being aware of. For example, a popular ransomware virus called WannaCry recently hit computers worldwide, encrypting files until victims paid bitcoin ransom payments. Once infected, you won't be able to access certain programs. Worse yet, you'll lose everything stored on your hard drive. Hackers have also found success by installing keyloggers, which silently record every detail typed into text fields. These logs often contain usernames and passwords that can then be used later to hack other people's accounts.

Finally, scammers sometimes try to trick you into giving away your private information over email. Here's a quick rule of thumb: If you haven't talked to anyone personally, chances are good that the message wasn't sent to you directly. That said, you should still exercise caution when opening links within messages. Always click the link in the body of the email first, making sure nothing pops up unexpectedly. Then, double-check the URL to ensure it looks legitimate. Next, read the entire message carefully before clicking yes or agreeing to anything. Finally, keep in mind that many shady businesses do business solely online, meaning you shouldn't trust any website claiming to offer free services.

Why do I get Yahoo emails that are not addressed to me?

Yahoo Mail accounts come with a built-in feature known as Smart Reply. Basically, Smart Reply uses natural language processing algorithms to analyze incoming messages and reply automatically based on keywords contained therein. Unfortunately, this system occasionally misfires. When that happens, you might suddenly begin receiving emails meant for someone else entirely. Sometimes, you'll even notice that the sender's name changes too. Other times, though, the sender remains the same but the subject line switches. Either way, you need to let yahoo know that something went wrong and request a manual override. To learn exactly how to fix the problem, follow our instructions below.

First, go to Settings & Security & Privacy & Yahoo Account Manager and enable Manage Third Party Applications. Then open the Yahoo Mail application again and scroll down to View Options & Preferences. From here, select Enable Advanced Features under Send/Receive Email. Now, choose Edit Message Details and click on the three dots icon next to the Subject field. Select Manual Actions and finally enter a description explaining what happened. Hit Save Changes and voila! All notifications related to the issue should disappear.

Why am I getting emails with someone else's email address?

Unfortunately, it's fairly easy for spammers to impersonate others in order to gain access to unsuspecting internet surfers' inboxes. Most commonly, they attempt to fool you into thinking someone important wants to speak with you. As part of the deception, they'll provide a convincing reason for wanting to chat. Perhaps they claim to be a relative, co-worker, or boss. Or maybe they say they work for a company you already deal with, hoping to convince you to share your personal information. Whatever the reason, they'll often present themselves as a real person and tell you to respond quickly. Afterward, they'll either leave you alone or continue sending you messages designed to lure you further.

Here's how to recognize a fake email address: Don't believe everything you hear. Just because someone says he works for Microsoft doesn't mean he is in fact working for the software giant. Likewise, don't assume that whoever claims to represent a law enforcement agency means you're actually breaking the law. Before responding, confirm the authenticity of the email address by calling the organization directly. If you feel comfortable doing so, you can also Google the sender's name along with phrases like "spam report" or "report abuse." A quick search should yield results detailing whether the user is legit or not.

Finally, if you're wondering how to prevent emails from containing spoofed addresses, the simplest solution is to set up filters. Head to Gmail settings & Filters and create a filter named Spoofed Addresses. Click Yes when prompted and the filter should kick in whenever you encounter an unsolicited email coming from an unfamiliar source.

Got any other tips to help identify false emails? Share 'em with us in the comments below!



San Francisco

We are the leading marketing automation platform serving more than 100,000 businesses daily. We operate in 3 countries, based in San Francisco, New York, Paris & London.

Join Anyleads to generate leads

Error! Impossible to register please verify the fields or the account already exists.. Error, domain not allowed. Error, use a business email. Welcome to the Anyleads experience!
More than +200 features to generate leads
Register to start generating leads

Create your account and start your 7 day free trial!

Error! Impossible to register please verify the fields or the account already exists.. Error, domain not allowed. Error, use a business email. Welcome to the Anyleads experience! By registering you agree to the Terms and conditions agreement.
More than +200 features to generate leads

We offer multiple products for your lead generation, discover them below!

>> Unlimited access to all products with one single licensecheck our pricing.