Tech Made Simple

Hot Topics: All Roku Players Compared | Best iPad Keyboard Cases | How to Get Emergency Satellite Service for Your Phone

We may earn commissions when you buy from links on our site. Why you can trust us.

author photo

How to Tell if Your Phone Has Been Hacked

by Palash Volvoikar on April 08, 2026

Phone spying concept

Updated on 4/8/2026 with new research and interviews with Sandra Glading, Online Safety Expert at McAfee, and Ignas Valancius, VP of Engineering at NordPass.

From banking to email to social media, our phones hold the most sensitive parts of our digital lives. That also makes them a prime target for scammers, malicious apps, and in some cases, spyware installed by someone with physical access to the device.

Attacks on smartphone users jumped 29% in the first half of 2025, according to Kaspersky, while a Zimperium report found that 82% of phishing sites now target mobile devices. And scam messages are getting harder to spot. McAfee says Americans now receive an average of 14 scam messages a day across text, email, social media, and phone calls.

For most people, the bigger risk is not a government-grade attack. It is a scam that steals account access, a malicious app, or spyware installed by someone close to them. “You can’t rely on how a message looks as your main signal anymore,” says Sandra Glading, online safety expert at McAfee. “Typos or awkward writing used to be red flags, and while those still exist today, many scams are much more sophisticated – with the help of AI, they can look completely legitimate and still be a scam.”

Here’s how to spot the warning signs, check the most important settings, and protect yourself from the most common ways phones get compromised.

Can you quickly tell if your phone has been hacked?

Usually, no. There isn’t a secret number to dial or a quick code that will tell you for sure whether your phone has been hacked. Viral tips about dialing codes like *#21# or ##21# are not reliable ways to tell whether your phone has been hacked. They only check call-forwarding settings.

What you can do is watch for a pattern of warning signs. A single issue like battery drain or overheating does not automatically mean your phone has been hacked. But when several problems show up together – like unfamiliar apps, unusual data usage, strange account activity, and unexplained performance issues – it is worth taking a closer look.

What Are the Signs Your Phone May Have Been Hacked?

1. Noticeable decrease in battery life

While a phone’s battery life naturally declines over time, a compromised phone may start draining much faster than usual. Malware or spyware can run constantly in the background, using your phone’s resources to scan the device and send information back to a server.

Of course, battery drain alone is not proof your phone has been hacked. Older batteries, heavy app use, and weak cell signals can all shorten battery life, too. But if a sudden drop happens alongside other red flags, it is worth taking seriously.

2. Sluggish performance

If your phone suddenly starts freezing, crashing, or running unusually slowly, malicious software could be overloading its resources or interfering with other apps. You may also notice apps refusing to close properly, random restarts, or the phone becoming unresponsive more often than normal.

That said, low storage can cause many of the same symptoms. If your phone is sluggish, check how much storage you have left before assuming the worst.

3. Phone feels hot when not in use or when charging

Apps running in the background can make any phone warm, but unexplained heat can also be a sign of malware. If your phone feels hot even when it is not being used, something may be working behind the scenes – whether that is a buggy app, aggressive adware, or in rarer cases, malware.

Try restarting the phone and see whether the problem goes away. If it keeps happening and you are also seeing battery drain or strange activity, look more closely.

4. High data usage

A sudden spike in data use is another warning sign. Malware or spyware may quietly send information back to a remote server, which can eat through your monthly data plan faster than usual.

On iPhone, go to Settings > Cellular and scroll down to see which apps are using cellular data. On Android, you can usually find this under Settings > Network & Internet or by searching Settings for “data usage.” If one unfamiliar app is consuming an unusual amount of data, that deserves a closer look.

5. Outgoing calls or texts you didn’t send

If your call log or text history shows activity you do not recognize, take it seriously. Some forms of malware can send texts or place calls to premium-rate numbers, generating charges that benefit the attacker.

Check your phone bill for charges you do not recognize and look for repeated calls or texts to unfamiliar numbers.

6. Mystery pop-ups and apps

Constant pop-ups can be a sign of adware, especially if they appear outside your browser or seem tied to no app you intentionally opened. You may also notice apps you do not remember downloading.

If you find an unfamiliar app, check where it came from. On Android, press and hold the app icon, tap App info, and look for the App details section to see whether it came from the Google Play Store. On iPhone, open the App Store, tap your profile icon, choose Purchased > My Purchases, and search for the app.

7. Unusual activity on accounts linked to your phone

If someone gets access to your phone or the accounts connected to it, the signs often show up elsewhere first. You may see password-reset emails you did not request, sign-in alerts from unfamiliar locations, sent emails you do not remember writing, or new accounts opened using your email address.

This can quickly turn into identity fraud. If you notice unusual account activity, change your most important passwords from a different device before doing a full security sweep of your phone.

If you’re seeing more than one of these warning signs, don’t panic. Many of these symptoms can also be caused by an aging battery, low storage, buggy apps, or poor connectivity. But if several signs are happening at once, the next step is to think about how your phone may have been compromised and lock down your accounts and device.

How Phones Usually Get Compromised

If your phone shows signs of being compromised, the explanation is usually not a sophisticated remote attack. More often, it starts with a phishing message, a malicious app, weak security on your Google or Apple account, or spyware installed by someone with access to your device. Here are the most common ways it happens and what you can do to protect yourself.

1. Phishing messages

For most people, phishing is the most likely starting point. A text, email, or social media message may look like it came from your bank, a delivery company, or even someone you know. The goal is to get you to click a link, scan a QR code, download an app, or simply start a conversation that leads to stolen account information.

These scams have gotten much harder to spot. AI tools now let scammers generate convincing messages in minutes, often copying the tone and branding of companies you trust. The old advice to look for typos and awkward grammar is no longer enough. McAfee found that many people now respond to suspicious messages that do not even include a link, which is how some long-running scams begin.

QR code scams have grown, too. Sometimes called “quishing,” these attacks use malicious QR codes in emails, texts, flyers, or even public places to send people to phishing sites or trigger malware downloads.

Likelihood: Very high.

How to protect yourself: Don’t click links in unexpected texts or emails, even if they appear urgent. Be cautious with QR codes from any source you were not already expecting. If a message appears to be from your bank, delivery company, or the IRS, go to the company’s app or website directly instead of using the link you were sent. And if a message starts an odd or urgent conversation, stop and verify the person another way before replying.

2. Unauthorized access to your iCloud or Google account

Someone does not always need to hack your phone itself to get access to the information on it. If they get into your Apple or Google account, they may be able to reach your backed-up photos, contacts, saved passwords, messages, location history, and email. Once they control your email, they can often use it to reset passwords on your other accounts, too.

This kind of account takeover is one of the most damaging forms of compromise because it can create a chain reaction. One weak password or one successful phishing message can open the door to your social media, shopping, banking, and mobile carrier accounts.

Likelihood: High if you reuse passwords, rely on weak passwords, or do not use strong two-factor authentication.

How to protect yourself: Use a unique password for every account and store them in a password manager. Turn on login alerts so you know when a new device signs in. Use passkeys where available, or an authenticator app instead of text-message verification. (Check our picks for the best authenticator apps.) Apple users should consider enabling Advanced Data Protection for iCloud, and Google users can enroll in the Advanced Protection Program.

3. Malicious or overly invasive apps

Some apps do far more than they claim. They may request access to your location, files, camera, microphone, or contacts when they do not need it to function. In other cases, the app itself may contain malicious code designed to steal data, bombard you with ads, or quietly run in the background.

This is especially common in categories people do not think twice about downloading, such as QR code scanners, PDF tools, battery boosters, memory cleaners, VPNs, camera filters, and unofficial game mods. The risk is even higher if you install apps from outside the Play Store or App Store.

Likelihood: Moderate to high, especially on Android if you sideload apps or install utilities from unfamiliar developers.

How to protect yourself: Stick to official app stores and avoid apps that ask for more permissions than they clearly need. On Android, make sure installs from unknown sources are turned off and check that Google Play Protect is enabled. On both Android and iPhone, review your installed apps regularly and remove anything you do not recognize or no longer use. If an app category has a long history of abuse, like cleaners or QR code scanners, be extra skeptical before installing one.

4. Spy apps installed by someone with physical access

Spy apps are one of the more realistic threats for ordinary people because they do not require an elite hacker. They usually require physical access to the phone, which means the person installing them is often a spouse, partner, employer, or parent. Once installed, these apps can monitor location, texts, calls, email, browsing history, and photos. Some can even activate the microphone.

That is part of what makes this category so disturbing. It is also why the threat often gets overlooked. Many people think about phone hacking as something done by strangers halfway around the world when, in reality, the person snooping may be someone who already knows the phone’s passcode.

Likelihood: Moderate for people in controlling or abusive relationships, lower for everyone else.

How to protect yourself: Use a strong passcode that no one close to you can guess. Review your apps regularly for anything unfamiliar. On Android, make sure “install unknown apps” is turned off. On iPhone, do not jailbreak your device. If you see signs that your iPhone has been jailbroken, such as alternative app stores like Cydia or Sileo, back up your data and reset the phone.

5. SIM swapping

With SIM swapping, a criminal convinces your carrier to move your phone number to a different SIM card they control. Once that happens, they can receive your texts and calls, including one-time security codes used to log into your accounts.

This is still a real threat, especially for people with valuable financial accounts or cryptocurrency holdings. But it can also be used against anyone whose phone number is tied too closely to account recovery.

Likelihood: Lower than phishing, but serious when it happens.

How to protect yourself: Put a strong account PIN on your wireless account and turn on your carrier’s available account lock, SIM protection, or number lock features. And wherever possible, stop relying on SMS for two-factor authentication. Passkeys and authenticator apps are safer. (Read more in our article How to Tell if Your Phone Has Been Cloned or SIM Swapped.)

6. Snooping through fake public WiFi networks

Public WiFi is safer than it used to be because most sites now use HTTPS, but that does not mean it is risk-free. One common trick is for scammers to create a fake hotspot that looks like the legitimate network for a café, hotel, or airport. Once you connect, they may try to redirect you to lookalike login pages or phishing sites.

Likelihood: Moderate, especially when traveling or connecting to open WiFi in public places.

How to protect yourself: Use apps rather than the browser for sensitive tasks like banking and email, and avoid entering passwords after connecting to an unfamiliar network. A VPN adds another layer of protection, especially on public WiFi. We recommend Surfshark and NordVPN and, for a free option, Proton VPN.

7. Remote exploits that target your camera or microphone

This is one of the most common misconceptions about phone hacking. Ignas Valancius, VP of Engineering at NordPass, says that "while many people fear their phone's microphone or camera is being used for spying, such attacks are technically difficult, expensive, and time-consuming. They are not practical for mass attacks and are typically reserved for highly targeted campaigns against high-value individuals, such as political leaders or government contractors. A far more realistic, and often dismissed, threat is a malicious app or website stealing your sensitive data."

Likelihood: Low for most people.

How to protect yourself: Install software and app updates quickly. Security patches matter because attackers often move fast once new vulnerabilities become public.

8. SS7 and weak points in the phone network

SS7 is an older telecom protocol that can be exploited to intercept texts, calls, and location data. It is not the kind of thing most people need to worry about day to day, but it is one reason text-message verification is not as secure as many people assume.

Likelihood: Low as a targeted attack on an ordinary person, but relevant to anyone relying on SMS for account security.

How to protect yourself: Use passkeys where you can, and use an authenticator app instead of text messages for two-factor authentication when passkeys are not available. For private conversations, use end-to-end encrypted apps like WhatsApp and Signal instead of relying on regular SMS.

9. Fake cellular towers, such as Stingrays

Cell-site simulators, often referred to as Stingrays, mimic legitimate cellular towers so nearby phones connect to them instead. That can let operators monitor calls, texts, and location information from phones in the area.

This is real technology used by law enforcement and government agencies, but it is not the kind of threat most people are likely to face in everyday life. It belongs in the “rare but real” category.

Likelihood: Very low for most people.

How to protect yourself: Use encrypted messaging and voice apps if you are in situations that may attract government scrutiny, such as a protest or other sensitive event. Encrypted apps make intercepted data far less useful.

The threats to our phones have gotten more sophisticated, but so have the tools to fight them. In most cases, protecting yourself comes down to a few habits: keep your phone updated, lock down your most important accounts, stay skeptical of unexpected messages, and pay attention when your phone starts acting in ways it normally doesn’t.

[image credit: Suzanne Kantra/Techlicious via Gemini]


Topics

Privacy, Phones and Mobile, Mobile Apps, Tips & How-Tos


Discussion loading

gravatar

From Peterlovegrove on April 22, 2020 :: 4:24 pm


Had email saying had one my passwords and will forward private video of myself that I don’t remember but threatens to send to contacts which I don’t no of tel/f/book etc
Asking for money in bitcoin in 24 hours I have replied but worrying email code could be one I use but not one I’ve used if I have in a while

Can this person send anything to my contacts and if can
And I see how do I take down or delete ?

Reply

gravatar

From Josh Kirschner on April 22, 2020 :: 6:06 pm


Don’t fall for it. The person has nothing on you. This is a common sextortion scam that’s been going around for a couple of years now. Click the link for more info.

Reply

gravatar

From Help on June 01, 2020 :: 12:53 pm


I have a notification with Google Assistance saying my phone has been hacked and im scared im just 14 I don’t know what to do

Reply

gravatar

From Josh Kirschner on June 01, 2020 :: 2:46 pm


Google Assistant won’t give you a message saying your phone has been hacked. That sounds like a scareware popup. Read our article on fake virus alerts and see if that sounds like what you experienced.

Reply

gravatar

From Doubt on June 07, 2020 :: 8:17 am


I have a question?? What are the chances the hack malware would get get deleted if u format your device

Reply

gravatar

From Josh Kirschner on June 09, 2020 :: 12:34 am


For the majority of spyware apps, or in situations where an iPhone has been jailbroken, resetting your device to factory settings almost certainly will remove the malware. I don’t want to say “definitely”, because there could be something out there that is more deeply embedded in your phone’s firmware that doesn’t get removed, but I would say that is highly unlikely for most people. And there are some cases where phone manufacturers installed malware inadvertently as part of their standard builds, which would not be removed on a reset.

Reply

gravatar

From Jeffrey on June 17, 2020 :: 8:07 pm


I was looking at a website and when I went to close out the tab there was another one open, curious I tapped on it and the website said that my phone had been hacked. It was in private tab so I can’t go back to it. Please let me know if this is a real alert and I what to do.

Reply

gravatar

From Josh Kirschner on June 18, 2020 :: 6:54 pm


Whatever site you were on delivered a scareware “pop-under” with a fake virus message. Just ignore it. For more information on how to recognize these scams, read our article on fake virus pop-up alerts.

Reply

gravatar

From 인스타 해킹 on June 18, 2020 :: 7:41 am


Thanks for sharing such informative article. Can you please throw some light on how to find out that your Instagram accounted has been hacked or not?

Reply

gravatar

From Josh Kirschner on June 18, 2020 :: 7:02 pm


Is there some reason you think your Instagram has been hacked? Is someone making posts and comments using your account?

Regardless of whether it has been hacked or not, if you have concerns, change your password and turn on Instagram’s two-factor authentication.

And if you want more of the Instagram basics, check out our article on Instagram 101

Reply

gravatar

From nani on July 05, 2020 :: 6:50 pm


My tablet keeps going off and restarting by itself. Please what could be the issue hear?

Reply

gravatar

From Josh Kirschner on July 06, 2020 :: 9:38 am


A number of hardware, firmware or software issues could cause that to happen, including a bad battery. I wouldn’t assume it was hacking, but it may be a sign of a permanent issue with your tablet. Your best bet is to factory reset it and see if that resolves the issue.

Reply

gravatar

From Tanaka on July 13, 2020 :: 10:48 am


My phone is constantly shutting down on its own and now I’m struggling to open apps such as Google play, discordant pinterest. I don’t know what to because I can’t download avast or other apps at that.
Please help me

Reply

gravatar

From Josh Kirschner on July 15, 2020 :: 9:42 am


This sounds more like a system or battery issue. The first thing I would try is doing a factory reset on your device (back it up first) to see if that fixes your issue. If not, it could be your battery. If it has a replaceable battery, see if a new one helps. If not, you may need to take it in for analysis and repair, or you may need to get a new device.

Reply

gravatar

From Norma Weitzel on August 31, 2020 :: 2:59 pm


I performed an hard reset on my phone and I created a different email account I noticed that when I went to my hot spot /mobile tethering the name and password was set already ..I thought strange cause anytime I’ve ever done hard reset on my phone never having anything backed up nor sync after doing such i’ve never seen my Hotspot having been named with a password set up.. I also noticed my device name was set as “naura’s galaxy s9” ??This shouldn’t already be set up especially if i didn’t back up nor sync any data after a hard reset right ? I’m concerned my boyfriend might have a spy app in my phone,  everything I send a text, receive a text , call etc..his phone dings everytime ..

Reply

gravatar

From Josh Kirschner on September 08, 2020 :: 1:17 pm


Did you go through the factory reset process in the Android settings? When you set the phone up again, are you sure you didn’t link to an existing Gmail or Samsung profile that would reload your settings? As you said, a true hard reset should permanently wipe all that data. I’m not aware of any spyware that is capable of blocking a hard reset, though I suppose it’s possible.

Reply

gravatar

From Parascma on September 11, 2020 :: 12:36 am


Could you stop your phone from being hacked if you delete the app though which the phone was hacked ?

Thanks !

Reply

gravatar

From Josh Kirschner on September 17, 2020 :: 9:53 am


If your phone was hacked by someone downloading a spy app to it, then deleting the app will resolve them problem. However, if someone had access to your device to install one app, there could be other issues. The best path would be to backup your data/photos and factory reset your device.

Reply

gravatar

From Sara on June 03, 2021 :: 3:38 pm


sorry but what you mean has access to your device to install one app ? you mean physical access or what ?

Reply

gravatar

From Josh Kirschner on June 03, 2021 :: 5:06 pm


Yes, physical access. If someone has physical access to your device, they could have made a number of changes that would compromise your privacy. So, safest to do a factory reset.

gravatar

From Blake on September 28, 2020 :: 11:55 am


My phone has been getting random pop ups and I am confused can you help I don´t know if I am getting hacked and it turned off randomly

Reply

gravatar

From Josh Kirschner on September 28, 2020 :: 1:16 pm


Popups can be caused by malicious ads on websites or apps that you have installed on your phone. What do the popups say and when do they occur? When visiting web pages or at any time when using the phone?

Reply

gravatar

From Sara on June 03, 2021 :: 3:40 pm


i receive popups also from avast antivirus free version; is it okay ?

Reply

gravatar

From Josh Kirschner on June 03, 2021 :: 5:12 pm


Do you have the Avast free version installed on your phone? If so, it’s possible it may be creating notifications to upgrade in you notification center, but these shouldn’t be coming through as popups. Popups on your phone are almost always a sign of adware you have installed or malicious ads on a site you’re visiting.

Avast does do popups on desktop, though. so that wouldn’t be unusual if you already have it installed.

gravatar

From It's me on October 02, 2020 :: 1:32 pm


I gave my whatsapp no to someone I met in online game, she said that she will call me but she didn’t than she started asking unusual question like name, age, no of brother name, brother age. Than she asked to chat via boobs voice to text but I didn’t than in a second my game crashed and it got on after 2 min but I am scared that if it is hacked kr or not
pls answer me. Because I was refusing to answer them but still she was forcing me to answer which was not in her attitude first.

Reply

gravatar

From Josh Kirschner on October 02, 2020 :: 5:01 pm


We know there are tools out there that have been used to target individual phones with malware, though you can’t do it just by knowing someone’s phone number unless you’re the high-profile target of a nation state, which I will assume you are not (and in that case, they certainly wouldn’t need to hit you up for your number through a game). From the sound of it, she/he is fishing for personal info they can use to answer security questions to hijack one of your accounts. Don’t provide any info and stop responding.

Reply

gravatar

From Samantha Matthews on October 03, 2020 :: 4:38 am


There’s this wifi option that shows up late every night that’s call FBI sevalance, when it shows up it knocks my husband and I both off of our network, what is it?

Reply

gravatar

From Josh Kirschner on October 04, 2020 :: 3:54 pm


You can name your Wi-Fi whatever you want, so someone near you decided that would be funny. It shouldn’t know you off you existing network, though, unless you try to connect to it. So make sure your device isn’t trying to connect to it if you’ve tried in the past by “forgetting” the network.

On the other had, if your network disappears when the other one pops up, that would indicate someone is changing the Wi-Fi name of YOUR router, which means they know your login info - that would be very bad. If that is what’s happening, you should change your router login credentials ASAP.

Reply

gravatar

From Andrew on October 09, 2020 :: 8:41 am


In the last month I have booked tickets to 2 events. And put my name on a waiting list for a ps5.  I have received fishing text messages for each of these incidents. However. The data was entered into a laptop not on my phone and they still got the info. Has my laptop been hacked? Or has my network been hacked?

Reply

gravatar

From Elizabeth Joubert on November 15, 2020 :: 5:34 pm


My number was used to phone someone..now I am accused of doing it.  Even the name of the caller is not my name but it is my number.  Please how can this happen..this is ruining my life

Reply

gravatar

From Josh Kirschner on November 16, 2020 :: 10:37 am


It’s very easy to spoof numbers and it’s standard practice for scammers to do that when making spam calls. My number has been spoofed, my wife’s number has been spoofed, anyone’s number can be spoofed. Unfortunately, there’s nothing you can do to stop it. This is something that needs to be addressed by the phone carriers with the new STIR/SHAKEN framework.

Reply

gravatar

From Emma on December 11, 2020 :: 12:16 am


I didn’t know about the text hacking and I went to a website that was weird so I got off it and the next time I went to do something on my phone it said that if I don’t download a specific app to put a security thing on my phone or else all my photos and contacts will be deleted. I don’t know if this is another trick or something but it’s scaring me. I don’t know what to do. Please help me!!

Reply

gravatar

From Josh Kirschner on December 16, 2020 :: 7:24 pm


Scareware has been around for a long time, trying to trick people into installing apps that either cost them money, serve up ads or create security risks of their own. This definitely sounds like scareware. It’s not clear on whether this is simply a popup you received will visiting a site or somehow you downloaded something that is serving up the message. The best thing to do is download an antimalware app - Lookout, Norton, Bitdefender, Kaspersky - and do a scan to make sure your phone is clean.

Reply

gravatar

From Tiffany on January 02, 2021 :: 7:23 pm


It started in sept. Shortly after i tried to break up with my boyfriend and told him i was in love with someone else. I ended up staying with him….since my phone has started dying quick, apps on my phone i didnt install, my passwords keep getting changed, bluetooth-nearby device scanning, call and text on other devices and a bunch of other crap turning on and off by itself. Now there is admins of every account and a super admin on my phone. This bs is unreal and he still denies it. The feeling of not having a lick of privacy or even be able.to speak to my family without him knowing every word. Its one of the worse feelings ive ever had. Ive cried day in and day out cuz of this. Why would someone who claims to love u so much and cant live without u hurt u so bad? Smh

Reply

gravatar

From john on January 23, 2021 :: 2:50 pm


Hi; I have an Samsung A10e. A friend(?) stopped by last night and when he left I went to use my phone and my contacts were gone! And…all my photos and messages too! Gone! In fact, the phone was wiped clean of everything and I had to do everything over as if I just got the phone! Can someone tell me what happened? Thanks

Reply

gravatar

From Sam on February 07, 2021 :: 4:21 am


Please my phone has been hacked and they’re asking for a ransom. A message was sent to my mail and that if i dont comply they’ll post my photos and videos

Reply

gravatar

From Josh Kirschner on February 08, 2021 :: 1:33 am


That sounds very similar to the porn email blackmail scam we covered a while back. It’s a scam, they don’t have access to your photos, don’t pay them.

Reply

gravatar

From Zach Jones on March 02, 2021 :: 7:10 am


Just the fact that you can scrub everything, by abandoning all your old accounts and getting rid of “infected” hardware and you still get hacked immediately, means there are people on the inside with high level access involved. In my mind, no question about it. If there was no hacking why would we buy all these security measures from them?
You still not convinced, ask yourself why we NEVER hear about a billionaire, and there are many of them, whom for a hacker would be the ultimate target. Why have we NEVER heard that Warren Buffet, the Koch Brothers, Marc Cuban, on and on and on. How come their accounts have never ever been the target of the abuse people are sharing here???? Ordinary hard working people….we ARE the Product

Reply

gravatar

From Josh Kirschner on March 02, 2021 :: 1:01 pm


Many of the suspected technical hacks described here simple aren’t possible. However, it doesn’t take much searching to see that anyone can be the victim of real hacking scenarios, including the wealthy, celebs and politicians: https://www.wired.com/story/bezos-phone-hack-mbs-saudi-arabia/

Reply

gravatar

From Amber on March 12, 2021 :: 12:06 pm


Okay for the past couple weeks my phone has been flashing as if I had screenshot my phone. for a split second it would flash then a notification will pop up with a tilted bell with the words super camera and disappear. my battery drains faster then usual. I’ve never seen anything like it before I’m very confused I am not sure if someone’s hockey me or stalking me I don’t know how to get help I did contact forensic cope professionals they had informed me that is very suspicious and unusual but for their help to track whoever and to find out what they’re doing it would cost me $900 which I do not have I’ve also came across On my files it seemed like someone was trying to track my location I’m just not sure what to think need some advice does anyone know about this or has anyone else had this happened to them before?

Reply

gravatar

From Josh Kirschner on March 12, 2021 :: 12:38 pm


It’s hard to say what is happening without more details and checking out the phone, but your best course of action is to download an antimalware program, like Lookout, and run a full scan. It should pick up anything that might be on there. If it doesn’t and you’re still concerned, back up your important photos/files and do a factory reset.

Reply

gravatar

From Tim on March 13, 2021 :: 3:02 am


Someonr took my phone is there q way i cam hack into and recover stuff if it wasn’t deleted?

Reply

gravatar

From Josh Kirschner on March 17, 2021 :: 11:21 am


If you never backed up your photos to Google Photos or another service, there is no way to “hack” into your phone remotely to access the photos.

Reply

gravatar

From Rani on March 19, 2021 :: 8:17 pm


I understood recently that somebody hacked into my phone. I gave my bank account details to a site. But when I logged to that site again I saw that details of another bank account is given. I have two bank accounts. What to do?

Reply

gravatar

From Izabele on March 23, 2021 :: 3:59 am


Idk what’s going on but from yesterday my apps keep closing, settings icon got deleted, i can’t turn on some apps, i can’t join zoom classes,and I bought this phone just last year. I Didin’t downloaded anything but what’s the reason what to do? Can someone help me please.

Reply

gravatar

From Sara on April 30, 2021 :: 1:51 pm


Hello everyone i need help, today when i login to my Gmail i found something strange, one unrecognized device login in my account. its a Samsung S20 5G Ultra i dont use samsung Devices. i removed that device. is my account compromized. need help.

Reply

gravatar

From Josh Kirschner on May 04, 2021 :: 10:54 am


Sometimes, Google can be a little unclear whether someone actually accessed your account (i.e., they had the correct login info) or “tried” to access your account (perhaps with login info from another site that was leaked in a breach). If they did access your account, or if you’re just unsure, you should immediately change your Gmail password. I also strongly recommend setting up two factor authentication for Gmail.

Reply

gravatar

From Sara on May 04, 2021 :: 11:07 am


Thank You.

Reply

gravatar

From kko on May 06, 2021 :: 1:35 pm


I received my debit card last Friday. Then I used my iPhone (safari) to unblock my card. On Sunday, my card was used to purchase a Netflix account. I didn’t use my card, neither left my house. I already canceled my card, but I’m worried now. Is it possible that my iPhone is hacked? Or only my safari? I already changed my passwords, what else should I do to stop that? Please help.

Reply

gravatar

From Greg on May 23, 2021 :: 8:26 am


Apps aside, my concern is more with firmware. Is it possible that some legitimately-priced phones from smaller Chinese companies like Unihertz are NOT under the thumb of the CCP and NOT sending all kinds of user (in the U.S.) personal data to the CCP’s servers?

Reply

gravatar

From Josh Kirschner on May 25, 2021 :: 10:17 am


We have never seen any direct evidence that any of the Chinese phone companies are compromised by their relationship with the Chinese government. However, given the strong warnings and actions by the US government, as well as a number of European nations, it does suggest there is evidence out there that is not being released to the public.

The question you should ask yourself, though, is do you care? Government spying of this nature is intended to target political or commercial information valuable to that party. For most of us, the Chinese government could care less what we’re up to. Meanwhile, there are plenty of advertisers, big data companies, social media sites, apps, etc. collecting data about your online and offline activities through perfectly legal means.

Privacy should be a concern for all of us. IMHO, the Chinese government should not be where most people’s concerns should lie.

Reply

gravatar

From sara on June 05, 2021 :: 4:05 pm


which hacking method or technique can hacker uses to hack and monitor someone camera ? does the only way is by installing spy app ? if mobile is android 6?

Reply

gravatar

From Sara on June 11, 2021 :: 6:24 am


Hello sorry to write here but there is no new comments section, so i replied here to write my comment
if i have a screen lock password on my android phone, but in the work sometime i leave my mobile in the office with my colleagues; as sometime I go to make coffee or sudden talks out the office or go to toilet ....etc is this it okay and my mobile is safe cause it has a password and no one know it ?

Reply

gravatar

From Josh Kirschner on June 11, 2021 :: 9:23 am


If you have a screen lock PIN on your device and it is secure enough not to be easy to guess, it will prevent hacking. No one will be able to access the phone to download apps or load anything through the USB port unless the phone is unlocked. As I recall, some earlier versions of Android (prior to Android 8 or so?) may have had USB access vulnerabilities, but this won’t be an issue unless your device is very, very old.

Read More Comments: 1 2

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships | Licensing & Permissions
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.