I appreciate your reply but I did in fact have a profile on my phone, NO ONE had access to my phone and I DO NOT have a company owned phone. This goes against everything that we Know to be true about hacking or something/someone’s ability to see what is in your phone.
I never said you didn't have a profile on your phone. I'm sure you did. You installed it. Whether you remember doing so or realized you were doing so is another matter entirely. I see it every day. Users come to me because something isn't working right and it turns out they clicked on an ad to get weather alerts or some such nonsense and ended up installing a profile on their device. That is not "hacking". That's getting a gullible individual to install something malicious. There isa big difference.
If all you mentioned is still true to this date, who do I contact to find out what exactly is going on with my phone and I still don’t know what a “SIM bug” is or how it can infect or be added to a phones SIM CARD. I ha e read various articles explaining that a phone can receive the bug simply by answering a call or opening a text message that is secretly encrypted with the “bug commands.” What are your thoughts on this?
I have NO IDEA what you're talking about in reference to a "SIM bug". That is a completely meaningless term.
Android phones have been found to be vulnerable to exploits that took advantages of security weaknesses in the Android OS. In several cases, Android devices could be compromised simply by receiving a malicious SMS message. The recipient didn't even have to open or look at the message. Android was so weak that simply receiving it was enough to expose everything on the phone to the attacker.
iOS has not been shown to suffer any such weaknesses and those weaknesses that have been discovered have been quickly patched.
Every app in the app store is rigorously vetted. There are no legitimate sources for apps outside of Apple's walled garden. that's one of the reasons that iOS is so secure.
When you install a profile, you are granting permission to the issuer of the profile to access information on and about your device. That is why you should NEVER do so without knowing exactly what you're doing.
Corporate management systems often use profiles to control company owned devices. The can monitor location, forcibly install and remove apps, and much more. When you install a profile, you are granting the issuer those kind of permissions.