10 Twitter Pet Peeves – The Good, The Bad & Often Ugly

If you’ve been reading ChicsTech for a while, you remember the post we did on the Good, The Bad and The Ugly of Facebook. We talked about those Facebook users who post countless photos of their cat, gross details about what their eating or doing and posting 50 times a day in general. Unfortunately, some of these users are also getting Twitter accounts and their behavior on Twitter isn’t much better.

Granted, one of the greatest benefits to Twitter over Facebook is the 140 character limit but in addition to that, so many tweets are sent each day that tweets don’t stay in your “feed” for very long.

Even so, users are using and abusing the power of the tweet and we’ve compiled a list of our 10 biggest Twitter pet peeves. Do any of these apply to you? Step away from the computer, set down your phone and tweet with care and consideration.

  1. The excessive @ tweeter. This is the person who has an @ sign in every tweet. Frankly, they’re just hoping for a re-tweet from someone with more followers than them. Hate to tell them but tweeting @ celebrities all the time isn’t necessarily going to help you grow your following.
  2. The excessive retweeter. This is nearly the opposite of the first person as this person never creates original content. They just scour their feed and retweet anything they find interesting. What’s worse is that they never edit the tweet and add their own thoughts, they just retweet verbatim.
  3. The “read my blog” tweeter. We all want people to read our blogs. But tweeting only links to your posts isn’t a good policy.
  4. Too many abbreviations. Believe it or not, Oprah does this all the time. Her feed is full of u, r, 4, 2 and multiple other super strange abbreviations. Yeah, you only have 140 characters but plan your tweets accordingly.
  5. A moving avatar image. This is so weird. It’s way too small to actually tell what you’re doing so just use a .jpg and call it good.
  6. The complainer. When one tweet a day is a whine about something, you should probably not have a Twitter account. If you don’t have something interesting to tweet, don’t tweet anything at all.
  7. Pointless profanity. There is so much needless profanity on Twitter. Way more it seems than on Facebook. Keep it clean the majority of the time and respect other Twitter users.
  8.  No description of your account. At least say your first name in the short description of you on Twitter. While you don’t have to give away your street address, come on, tell people a little bit about what they can expect from your Twitter feed.
  9. The moocher. Some people tweet for the single purpose of trying to get companies to give them free things. This goes along a little bit with number 6, the complainer, but tweeting @ companies all the time hoping for something in return is obnoxious.
  10. The person who follows everyone. If you have 10 followers and are following 10,000, there might be a problem. Don’t follow everyone immediately after you join Twitter. Choose your follows carefully to keep some sort of balance between following and followers.

Some of you may have peeves on #hashtags, we don’t but open to your thoughts.  Just like with Facebook, be a respectful Twitter user. Of course, have fun with this social network but do unto others as you would want others to do unto you.  And since we’re talking Twitter, don’t forget to follow this blog @BeautyApps for more great information.

Note:  Literally everyday I get asked about Twitter as people understand Facebook, Linkedin, Instagram, Pinterest and even Snapchat.  However, Twitter seems to hard to grasp or understand.  Here is why Twitter is important.  First, Twitter is a newsfeed as people don’t go to websites any more they go to Twitter first and if they see an idea or headline they want to see or know more about they will then go to your website as most people do not think your website has all the news they want or need.  Second, Twitter is social media you can find and meet prospective clients and discuss business easily.  I am not suggesting you do as many do “thank for following me and here’s my sales pitch.”  I am suggesting like every other kind of business connection, you offer thought leadership first in the form of blog posts and great content – why your business is the best business to do business with.  Third, Twitter is fun, you can find interesting facts, topics and political pandering.  Fourth, most important Twitter is social media like a cocktail party you engage and have conversations with others not just toot your own horn.  Being nice will bring you more rewards than just being boastful.

If you need help with you Facebook, Twitter, Linkedin or other social media efforts, please email us cross@gocross.com or on Twitter @techtionary. You should also follow one of the great social media experts who has worked hard to gain followers and you should consider his services to help you – @evankirstel.

Social Media Addicted? – The Text You Take is the Life You Make

Social networks were once an extension of our everyday lives, something we used when we were bored and had some free time in our hands. Over time, socializing over the internet has taken over our lives, to the point where many people are now suffering from social network addiction and shunning real life relationships in favor of virtual ones.

A number of studies are now showing that our love for virtual socializing has become an addiction for many. Gadget-advice site Retrevo conducted a study in 2010 and found that 42 percent of people open their Facebook or check their Twitter account as soon as they wake up – sometimes before they even get out of bed. Probably more telling is the fact that 24 percent of people text message while in the bathroom and 32 percent would interrupt their restaurant meal just to answer a message. Begin by look at your own uses and think about how annoying it can be to others when you interrupt a conversation for a text message.  One of the best movie lines is from “The Devil Wears Prada” where her boyfriend says to Emily, “the person who’s call you take is the relationship you are in” when Emily takes a call from Miranda while in a conversation with him.  Also, if you’re text message is more important than the person you are with then they run your life because you don’t.

That need for virtual interaction has moved beyond social networking places. Social shopping is a new form of e-commerce that allows you to interact with virtual friends during the actual shopping experience.
Social shopping marketplaces such as Groupon act like a bazar of sorts, where you can get in touch with others who are buying or selling their wares, while shopping communities such as Kaboodle allow you to discuss products with fellow shoppers or ask for advice on an item you’re considering.

Social shopping apps such as Pose and Fashism are blurring the lines between social shopping and social networks. Pose allows you to take photos of your shopping experience (or the items you take home) and immediately upload them online, so you can get feedback from the virtual community.  Fashism is a similar app, although Pose has a “friends-only” setting option, while Fashism allows everybody in the network to see your posts. Part of the attraction of these sites relies on the fact that they allow you to “take a friend along” when you go shopping, even if it’s not a real one.

Experts believe people with low self-esteem problems or suffering from depression are more likely to become virtual addicts. Virtual lives don’t present the same level of challenge and risk than real-world connections, which is why many people decide to rely on them to find friendship and “conversation.”

Could you be a social media addict? Experts recommend looking out for these clues:

  • You spend more time online than interacting with real people
  • You cancel plans with your real-life friends in order to follow a Twitter chat or series of updates
  • You feel panicky if you’re on vacation somewhere and you can’t access your Facebook account regularly
  • How important is it to check for updates? In the Retrevo study, 19 percent of people admitted to checking their Twitter account in the middle of the night if they happened to wake up to use the bathroom, and 40 percent admitted to doing it while driving. If this sounds like something you would do, you might have an addiction problem.

As long as you use it in moderation and not as a replacement for real-life interaction and relationships, social media can improve and enrich your life. It’s only when it becomes an excuse to hide from the world that you should start to worry.



Bully Movie – Cyberbullying – The Darker Side of Social Networking

This is another view on cyberbulling by a guest blogger to get another set of eyes and views on this critical issue.

The internet, and particularly the rise of social networking, has helped people all over the globe connect. This increased ease of communication, however, has its dark side, demonstrated by the dramatic rise in instances of cyberbullying or cyber-bulling.

What is CyberBullying?

An unknown word until recently, cyberbullying describes harassment via a digital medium, such as a social network, email, chat board or even text message. Victims and perpetrators of cyberbulling are usually children or teenagers – once adults are involved, it becomes cyber-harassment.

Cyberbullying covers a huge spectrum of behavior, from ‘minor’ instances, that might involve a a few teasing text messages, to full-blown campaigns of humiliation and torment that have led teens to attempt or commit suicide. Cyberbullies might carry out all the bullying themselves, or they might enlist the help of others, who – knowingly or not – help them with their campaign.

How CyberBullying Affects Children

Cyberbullying has all the effects that in-person emotional bullying has on children. Arguably, these effects can be worse with cyber-bullying, as children often hide it from parents, teachers and friends through fear of humiliation, and because they’ve been threatened by the bullies. Cyberbullying is rarely just one message, email or text. Instead, bullying campaigns can go on for months, even years.

As the bullying is digital, it might also be anonymous, which can make it very difficult to find and stop the bully. Perpetrators have also been known to pose as other children, leaving them difficult to identify.

Several prominent cyber-bullying cases have made national headlines in recent years. In March 2012, a Maryland teenager left messages on social networking site Reddit, threatening to commit suicide if her school didn’t do something to stop her cyber-bully. In the same month, a student was convicted of a cyberbullying campaign that led to his roommate’s suicide in 2010.

How to Respond to Cyber-Bullies

Every cyberbullying case is different and will need to be treated differently. Cyberbullying victims should always keep a copy of messages they received, as this could be used as proof later. However, they shouldn’t respond to the bully, no matter what they say or do, and should try and block the bully from contacting them. Telling the victim’s school and potentially even taking legal action could cause the bully to stop. During and after bullying cases, it’s important that victims receive appropriate counseling to help them deal with the situation.

Where to Find Help

As agencies, communities and companies start to realize just how pervasive and damaging cyber-bullying is, more groups are coming together to raise awareness and encourage young people to take action to stop cyber-bullying. MTV recently teamed up with the phenomenally popular Angry Birds app, offering users the chance to unlock a hidden level in “Angry Birds in Space” if they spread the word about MTV’s anti-bullying campaign.

A cyberbully can have many different motivations for their behavior, and both victims and perpetrators of the bullying need help and support. If you or someone you know is affected by cyberbullying, or if you would like to learn more, the following resources offer support and advice:

–  Stop Bullying is a national resource that provides advice and guidance to everyone who might be affected by cyberbullying, including schools and parents, and also run a 24-hour hot line: 1-800-273-TALK (8255).

–  Stomp Out Bullying is a resource specifically for teenagers, raising awareness and running campaigns to try and stop bullying.

–  For parents, PACER’s National Bullying Prevention Center gives advice and information on how to support bullied children.

“Bully” the movie tracks five students who faced daily bullying, and has sparked The Bully Project, which offers information to students, parents and teachers.

Be safe, get iPeersafe – free app.


College Tutoring & Business Coaching Idea Tracking Using iFlipTips – Q&A Tool, Organizer & Session Notetaker-Recorder

iFlipTips is a new study and training app for iPhone and iPad from TECHtionary. Useful for students, facilitators, and trainers, this app is invaluable for professionals in a coaching role. Not only can iFlipTips help you facilitate coaching sessions, but it can also help you record and organize client records, and send them notes of what you discussed afterwards.

Whether you’re engaged in business or life coaching, iFlipTips can help you prepare and record successful sessions. As a note-taking app, it allows you to create flashcards containing bite-sized pieces of information using different mediums.

The app is divided into two sections: iTips-Ideas Cards, which help you create training notes, and iFlipCards, which use a question and answer format. Each iTips-Ideas card or iFlipCard contains a box for text, an image, an audio recording and a video clip. Using different mediums, you can create notes for clients using a format that suits their learning style, and that they feel most comfortable with.

Some clients might prefer brief text notes covering only the most important points of the session, while others might prefer receiving audio or video recordings of key moments, or even the whole meeting. By sending them notes in different formats, you could help speed up their learning process, and increase the rate at which they retain information you discuss during their sessions.

iFlipTips’ folders system helps you organize your notes in a way that enables you to store and retrieve them efficiently. The folders are fully customizable, so you can create a filing system that suits your way of working. Potential methods of organizing your notes include using main folders as a calendar system, creating a separate folder for each week or month, then sub-folders for individual clients you will see within that time period. Ordering the folders in this way helps you organize session material in advance, and plan when you need to conduct mid-contract evaluations and reviews.

Alternatively, you can use the folders to organize notes and prompts structured around your methodology or framework. For example, if you use the GROW method, you could create a main folder for each separate session, with separate sub-folders containing prompts for each step of the framework detailed on individual iTips-Ideas cards. This can help remind you of useful questions at key moments in the session, and to stick to a boundaried framework. You could also consider organizing prompt cards by issue, creating separate folders for motivation, procrastination, indecisiveness, and so on, so you can reference relevant questions depending on what struggles your client raises during a session.

While iTips-Ideas cards can be helpful for making general notes about sessions, you can use iFlipCards to create questions and answers around key issues for your client. For example, you can prepare sets of questions before a session, then record the client’s responses during your meeting using brief text notes, or through the audio or video functions. This can be helpful discussion material during the session, and you can also share the notes and clips with the client via email afterwards, giving them material they can use for reflection in between sessions.

Identity Protection & Reputation Management

Since its introduction to the public, the Internet has brought us a great deal of convenience, allowing us to find a wealth of information we wouldn’t otherwise have access to. Unfortunately, other Internet users also have easy access to the same levels of information and sometimes it pertains to us. The rapid pace at which technology and information availability has grown has made it easier for Internet identity theft and cyber bullying to occur.

Nowadays, it’s important to protect yourself, your reputation and your privacy on the Internet just as you would in the real world. According to Reputation.com, Kerry Harvey, a 23 year old sales executive, fell victim to identity theft and had her reputation ruined when someone stole her personal information from her Facebook account and set up a new account, promoting Harvey as a prostitute. Although the fake Facebook account was eventually deleted, the identity thief was never caught and Harvey’s life and reputation were both adversely affected for years after the incident occurred.

Internet monitoring is a proactive practice every user should employ to keep track of information posted about on the Internet. A proactive approach can help you avoid the presence of potentially damaging information on the worldwide web where it can affect the rest of your life. This type of careful proactivity can protect your online reputation and safeguard your identity, job status and personal reputation if you incorporate some of the following common sense practices.

  • Find and Alert You to Posts About Yourself. It’s one thing if you voluntarily post information about yourself on social media venues such as Facebook. But if you discover someone else is posting about you, especially in a negative light, it can be alarming, hurtful or even scary. Some of the people who create these harmful or negative posts are cyber bullies. The ability to find these types of posts can help you act to deter a cyberbully from continuing this behavior. Google Alerts can send you notifications of posts and responses as they occur so you have the opportunity to act fast when something potentially damaging is posted.
  • Find Personal Info Exposed on Internet. We all enter personal information on the Internet. If you bank, shop or conduct business online, chances are you’ve set up a personal profile that contains various pieces of personal data. Proper protection can prevent identity theft by protecting your passwords from being swiped via the Internet or cellphones. According to Science Daily, anti-virus, anti-adware and anti-spyware programs offer comprehensive protection that provides a triple threat against identity thieves. Programs such as McAfee and Avira protect you from self-installing software that can glean your passwords, as well as information about your computer use.
  • Clean Up Damage to Your Reputation. The ability to clean up your online reputation can have a great impact on your career, personal life and family life. If the damage is extensive and impactful on your career, litigation can be effective in having slanderous material removed. AutoBodyNews.com encourages businesses whose success has been affected by false information posted on the internet to counteract it by building up their reputations with positive information on their website or blog.

The wrong information in the wrong hands can prevent you from being hired, cause you to be fired from your job or harm your reputation at home or in school. The ability to be proactive is critical to ensure that your reputation and image are safeguarded in a way that allows you to progress through life without having to lose days, weeks or months trying to undo the mess created by damaging or personal information on the Internet. Practice common sense when posting on the Internet and use these suggestions to avoid becoming a victim of identity theft or damaged reputation.

Reputation Management: Business Warfare – Top 5 Steps to Respond to and Diffuse Negative Comments and Attacks

 Business Warfare – Top 5 Steps to Respond to and Diffuse Negative Comments and Attacks 
As a midsized business, it’s always nice to receive positive comments and feedback so you know what you’re doing right. But criticism and negative feedback are just as useful, sometimes even more so. If you can take a step back and avoid taking negative comments personally, they can also serve as a guide toward greater business success. Being on the receiving end of unpleasant feedback or even insults and attacks can turn out to be the catalyst that helps you build your business. To use them in the most effective manner, follow these five steps for responding to negative comments and diffusing insults and attacks.

  1. Be Quick to Respond. According to a study conducted by Cone, a Boston communications and strategies agency, 80 percent of all consumers opted not to purchase from or frequent a business due to negative feedback they read on the internet. Review sites such as Angie’s List and Yelp have the power to impact your business positively or negatively depending on the reviews left there by customers. Although you might not be able to stop a bad review, you can respond quickly to avoid it escalating and damaging your business in the process.
  2. Be Personable and Professional. Respond to negative feedback in a personable and professional manner. Introduce yourself and your title, whether you’re responding online or in-person. Rather than making excuses, acknowledge that you appreciate the person’s words and will convey them to the rest of the team.
  3. Refrain From Defensive Behavior. When responding to a dissatisfied customer or bad online review, refrain from comments made out of anger or defensiveness. Stooping low in your response only makes the company look worse and may cause the situation to escalate.
  4. Listen and Take Action. New Jersey-based marketing expert JC Dawkins told Entrepreneur.com that she and her husband decided not to try a new restaurant in the area based upon a horrible review she read online…one that had been left unanswered by the owners. Whether the negative review was warranted or it was left by someone who’s being insulting and attacking for no reason, it’s important to listen and take action to avoid a repeat situation. Ask yourself if there’s a kernel of truth in what’s being said. If so, how can you change things for the better?
  5. Follow Up. Whenever bad reviews or negative feedback prompt you to make changes in your business it’s important to follow up with the customer to let them know. This gesture of good faith can be the deciding factor that converts an unhappy customer to a happy and loyal one. Take the time to post a follow-up comment or contact the customer via email, by phone or through the mail.

The perceived value of your products and services can decrease significantly based solely upon negative reviews. By responding promptly and in a professional manner, you can diffuse bad reviews and negative comments and turn them into business-building opportunities. Although negative feedback can impact your business, it won’t cause as much damage as your lack of response.  

Following these steps shows that you care about your business and how you can best serve your customers.

Business & College Presentation Development and Improving Presentation Skills Using iFlipTips

Good presentation skills are crucial. We use them in our careers and our personal lives, and utilize these skills even when we might not realize it. Developing your onsite and online (webinar) presentation skills can have a positive impact on many different areas of your life and, for that reason; it’s beneficial to improve your presentation skills, even if public speaking isn’t a key part of your job role right now.

iFlipTips is a study and training app for iPad and iPhone that revolutionizes the way we deliver and absorb information. As well as being an invaluable tool for students of all subjects, iFlipTips can also help you when you’re teaching yourself new skills. The app avoids the traditional text-based learning style, and instead focuses on providing you with a variety of tools to help you create flashcards that increase your learning speed and help you retain and recall more information in less time.

The iFlipTips app is divided into two sections: iTips-Ideas cards and iFlipCards. Each card contains four different formats: text, image, audio, and video, so you can record and store information using different mediums. When studying and improving your presentation skills, you can use these different formats to learn new skills more efficiently.

If you’re working to improve your presentation skills, the best place to start is to evaluate where you are at the moment. iFlipTips helps you do this, as you can record yourself giving a staged or real presentation using the audio and video functions. Doing this can help you identify and improve aspects of your presentation, such as your body language and tone of voice.

The ability to record videos and audio clips means you can also capture snippets of public speakers and presenters you admire, and use the recordings to compare their style to your own practice sessions. Watching other successful public speakers, you can identify what you enjoy about their delivery, and attempt to reproduce that in your own presentations.

As you develop your skills, recording yourself can also help you prepare for live public speaking engagements. Thorough preparation helps you gain confidence in your ability to give an engaging and interesting presentation. Practice is the key to success, and using the iFlipTips video function, you can simulate what it feels like to have a live audience.

The text function can help you make key notes about presenting skills, for example that you should never start with an apology unless you’ve made an error, and that you should always credit the source of quotes you use. By saving these “notes” in ordered folders, you can easily refer back to them later to remind yourself of key messages and tips.

As well as helping you improve your presentation skills, you can also use iFlipTips to keep you on track during presentations. Use iTips-Ideas cards to outline the structure of your presentation, and record key quotes and facts you want to remember in the text box. If you want to, you can also share your notes with others via email, Facebook or Twitter directly through the app.

If you plan to include a question and answer session at the end of a presentation, the iFlipCards can help you prepare. Create a separate “question” card for each question you anticipate being asked, and then create an ideal response on the “answer” card. Avoid memory blanks and feelings of panic, and instead enjoy confidence in knowing that you’ve prepared as thoroughly as you can.

iPocketBra or iBraTop – iPhone Pocket Running Bra – Ideal for Running or Running from Thieves

According to Seattle-based JoeyBra, “Our unique design will hold most cellphones, ID, key, and other small items regardless of bust size – no amount of items will change the way your bra fits you. When the pocket is empty, our patent pending design will look exactly like any other bra which means you can wear it night or day. Never again will you have to reach down the front of your dress looking for the key that slipped out of place. Our product places all pockets within easy, yet appropriate reach.”

Here’s a little more on the Bra Design:

  • Sexy lace detail
  • Lightly padded push-up
  • Convertible and removable straps
  • Comfortable fit and design

This is a cool concept for any girl who goes anywhere who just wants to take her iPhone, ID and credit card to the bars without having to worry about pickpockets or thieves who assault especially women for their valuable iPhones.


Frazzing: Frantic Multitasking – Efficiency Turns Into Stress with Tech-Based Multitasking

Smartphones, pads, pods, tablets, PDAs, laptops and other mobile devices are all supposed to make life easier. After all, you can do just about anything and go just about anywhere without missing an important email, phone call or text message. But when technological multitasking becomes a consistent part of your day it can serve to distract you from important tasks, rather than help you complete them.
According to the ABC News Online science section, this phenomenon is growing so rapidly that it even has its own name: frazzing. “Frantic multitasking” is the meaning behind the word “frazzing” and there’s nothing efficient or stress-free about it. If you’ve fallen into the trap of regular frazzing, you’re likely to experience these issues:

  • Time-Wasting Interruptions. Professor Gloria Mark of University of California, Irvine, studied a group of office workers over a 13-month period and found that technological multitasking led to work interruptions every 10 ½ minutes. To make matters worse, it took the average worker more than 23 minutes to get back to their task after being interrupted.
  • “Where Was I?” Syndrome. Not only do frequent interruptions stop work flow, they also cause people to lose their focus. After stopping for emails, text messages or phone calls, many people find themselves wondering out loud, “Now, where was I?” Consulting firm Basex states that these kinds of interruptions can cause workers in some industries to lose over two hours of productivity per day, while costing up to $588 billion each year.
  • Overloaded & Overwhelmed. When you get down to it, frazzing leaves a person feeling frazzled. There are those who feel they cannot meet their productivity requirements without it, but the expenditure of energy and adrenalin can leave you feeling overloaded, overwhelmed, and physically and mentally fatigued.
Setting boundaries is an important part of dealing with the stressful impact of multitasking. It might not be realistic to eliminate certain technologies from your life, but it is wise to limit, consolidate and organize your usage of them so they can truly help you, rather than cause undue stress. Use these tips to help you convert frazzing back into efficiency:
  • Schedule Tech Checks. Since you’re able to see if most new messages or emails are urgent without opening them, there’s no reason to stop what you’re doing each time one arrives. Set specific blocks of time aside to catch up on email or respond to text messages to eliminate unnecessary interruptions.
  • Create Boundaries & Communicate Them. The boundaries you set are only as good as your communication of them. Let your coworkers or family members know you can only respond to emails and text messages during specific times. Stick to your own boundaries so others can follow your lead.
  • Use Silence Mode & the Stop or Off Button. No matter how resolved you are to reduce the stress of multitasking, a buzzing smartphone or “You’ve got mail!” sounding off every few minutes is going to distract you. Make it easier on yourself by turning your devices off or putting them in silent mode.
Smart use of technology can make your life easier and your workday more productive. Remain in control of your usage to prevent multitasking from controlling you. Keep it simple and balanced-technology is helpful and important, but it’s not everything.

Cheating and Getting Caught Via Cellphones – You Will Get Caught !

Years ago, if you suspected your partner of cheating, a private investigator was your best option for gathering evidence. Although private investigators are still an effective option, many people are taking advantage of technological advancements to catch and prove their partners’ infidelities. That handy smartphone used to store your pertinent information and keep in contact with friends and family has another use that’s gaining in popularity– provider of proof that you’ve been cheating.

Smartphones are making an increasing number of appearances in family law courtrooms during divorce proceedings and are being introduced as evidence, relays The Bend Bulletin, an Oregon newspaper.  In the past three years, it’s become more commonplace for call and search histories, text messages and emails from smartphones to be used against the smartphone’s owner. According to a survey conducted by online dating website Sugardaddie.com, more than 58% of people caught cheating on their spouses stated that pictures and other information on their cellphones led to them being found out. Anyone foolish enough to cheat can be found out with the following cellphone components, apps or software:

  • Text Messaging. A survey of more than 800 attorneys from the American Academy of Matrimonial Lawyers revealed that 92 percent have seen a rise in evidence being gleaned from smartphones. Text messaging is the top source of incriminating evidence that points to cheating and other issues relevant in divorce court. Sent, received and saved text messages can all be used to prove cheating.
  • Email Storage. Backing up your cellphone data to iCloud or another smartphone storage program is a good idea. But if emails or other incriminating documents are included in the storage they can make their way into the courtroom as evidence.
  • GPS Locater Apps. This smartphone app is often used by parents who want to keep track of their kids and it’s handy when you’re trying to locate a lost or stolen cellphone. But GPS locator apps can also let your spouse or partner know where you’re at, leading to big trouble if you’re somewhere you shouldn’t be.
  • Call and Search Histories. A smart cellphone user will erase his or her call history to remove potential evidence, but might not think to do the same with their search history. Search histories can reveal anything, ranging from information on the person you’re cheating with, places you’ve taken them and even more obvious searches such as “how to cheat on your spouse”.
  • Cellphone Spy Software. In addition to GPS locator apps, there are many types of spy software programs for cellphones that allow you to listen in on your partner’s conversations, track them through GPS and read emails or texts. Software programs such as Cell Phone Spy and MobiStealth provide you with information regarding your partner’s activities without him or her even knowing the program has been installed on their cellphone.

There’s an old adage that says “cheaters never prosper” and today’s technology makes this statement truer than ever. No matter how careful a cheater might try to be, it’s likely there’s evidence to be found somewhere within his or her cellphone. While it’s smart to make sure you don’t keep incriminating evidence on your cellphone, the smartest choice is not to cheat at all as you will indeed, be caught!