With all the reports about malware attacks and data breaches, no one can blame you for wanting to protect your cell phone from hackers. You can take steps to secure your phone, improve your password smarts, and protect your data. Nothing is fool-proof, but a little bit of know-how will improve your chances of hack-proofing your phone.
Steps
-
Install security software on your Android phone. Don't download just any app. Read recommendations from trustworthy sources like Consumer Reports , CNET , and AV-TEST . Make sure that you choose an antivirus from a reputable antivirus company that you recognize, such as Norton, McAfee, Avast, or Bitdefender. Antivirus apps from reputable companies are better at detecting viruses than apps from unknown companies. [1] X Research source
- For the most part, the iOS software is difficult to hack. However, some versions might have vulnerabilities. The best you can do is update your software as soon as new versions are released and be careful which apps you can install. [2] X Research source
- Don't rely on Google Play Protect as your antivirus. Play Protect has performed poorly in tests. [3] X Research source
- Password-protect your security software, if possible.
-
Set a passcode. Pick something that's complex, yet easy to remember. Avoid birthdays, pets' names, bank PINs, or part of your phone number. Follow the instructions at Apple or Android support to set yours up.
- To set a passcode for your iPhone, choose a code that consists of six digits, four digits, or an alphanumeric code you set yourself. [4] X Research source
- Avoid easy unlocking methods. Don't be tricked by fingerprint- or facial recognition. Hackers can copy your fingerprints from drinking glasses or use photographs of you.
- Don't set your phone to automatically unlock when you're at home or when it's near other smart devices. If someone breaks into your home or gets a hold of your smart watch, your phone will be vulnerable. [5] X Research source
- For an Android phone, start at the menu button from the home screen. Tap “Settings,” then “Security,” and then “Screen Lock.” The actual words might be different depending on your phone's brand name. Choose between Pattern Unlock, a personal PIN, or an alphanumeric password. After that, choose how long you want your phone to wait before locking. [6] X Research source
Advertisement -
Vet apps before installing them. Download apps only from a reputable seller or site, such as Apple's App Store or Google Play. Be careful if you use an Android phone. Google doesn't vet its apps as carefully as Apple. Read reviews from Consumer Reports , Wired , or CNET before downloading any third-party apps. [7] X Research source
-
Make sure you know how to control your phone remotely. Settings or apps allow you to remotely lock and erase your phone if it's stolen. If you have a newer phone, you don't need to download anything. Control your iPhone through “Find My Phone” in iCloud. [8] X Research source Remotely secure your Android phone through your Google account with Android Device Manager. [9] X Research source
-
Use caution with unsecured Wi-Fi connections. Unsecured connections don't have lock icons near their listings. Avoid them, if you can, and use your phone's secure mobile connection. Otherwise, install a virtual private network (VPN), which directs your traffic through encrypted connections. Even if you're using a VPN, never access your bank account or vital records on an unsecured connection. [12] X Research source
- Secured connections have a lock icon, usually located across from the name of the network.
-
Disable Wi-Fi, Bluetooth and Cellular Data when you're not using them. A hacker can't hack your phone if it's not connected to the internet. Follow the instructions in your user's manual or support section of the phone manufacturer's website.
- Turning on Airplane Mode is an easy way to turn off all communication on your phone with the push of a button.
-
Charge your phone on trusted USB ports. These include the ports on your computer and in your car (if applicable). Hackers can hack public USB charging ports, like the ones you may see in a coffee shop or airport, and steal personal information. [13] X Research source
- For this reason, it's a good idea to bring your electrical outlet adapter in addition to your USB cable if you're traveling. Hackers can't hack your phone through your USB adapter.
-
Keep your operating system up to date. As soon as Apple or Android tells you an update is ready, download and install it. Many hackers take advantage of vulnerabilities in out-of-date operating systems. Updates patch these holes and make your phone more secure. [14] X Research source
-
Choose a password that's hard to guess . Use complex combinations of letters, numbers, and symbols. The more complex you make the password, the more secure it is. Use uppercase letters in the middle of your password and throw in an obscure symbol to further complicate it.
- Avoid using obvious passwords like birthdays, anniversaries, or consecutive sequences like “1, 2, 3, 4, 5.” Don't use letters that spell out words such as your mom's maiden name or your pet's name. [15] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source
- Password-protect your voicemail, Wi-Fi connection, and individual apps that you use for banking and email. When securing your voicemail, follow the instructions on your service provider's website. [16] X Research source
- Consider using a Password manager. A password manager can generate and securely store passwords for all of your accounts. With a password manager, you'll only have to remember one very strong password.
-
Keep your passwords private. Use this as an unbreakable rule with everyone—best friends, partners, children, etc. When you're in public, glance around to make sure no one is looking over your shoulder. Finally, avoid entering a password near a closed-circuit television (CCTV) camera. You don't know who's watching on the other end. [17] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source
-
Avoid auto-login. It might seem convenient for you, but it makes hacking as easy as opening your browser. Take the time to enter your usernames and passwords, especially on sites that you use for banking and other sensitive business. Type slowly to avoid getting locked out.
- If you're really pressed for time or just can't remember too many passwords, use a password manager. These programs store your passwords and fill them in when you access each site. You can lock the manager when you're not using it. Better yet: you'll only have to remember one password. [18] X Research source
-
Use a variety of passwords. Having the same password for your email, bank account, and social media apps makes a hacker's job too easy. Take the time to think up creative mixtures of letters, numbers, and symbols for each account. Use a password generator backed up by a password manager to make this less of a burden on you. [19] X Research sourceEXPERT TIPTechnology SpecialistBrandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.
Avoid using the same password for multiple websites. If your login information on one website is compromised, hackers can potentially gain access to your accounts on other sites. Be sure to create unique passwords for each site to reduce your risk of being hacked, especially if a site seems like it has questionable security.
-
Change your passwords often. Create a password update schedule. Whether it’s weekly, monthly or quarterly, have a plan and stick to it. You could even enter a coded reminder in your calendar.
-
Don't share too much personal info on social media. It's okay to use your real name for networking but leave it at that. Never provide your address, phone number, mother's maiden name, etc. on your profile. Avoid even “safe” information like your favorite song or the book you're currently reading. Hackers can use any of this information to hack you and steal your identity. [20] X Research source
-
Delete personal data from your phone. Photos can reveal a lot about you, allowing a potential hacker to steal your identity. Notes from your morning meeting can provide a wealth of info for industrial spies. Transfer your photos and any sensitive text-based files to your laptop or desktop computer.
- Reset your device when you want to recycle it (similar to reformatting a hard drive). First, perform encryption to scramble any data you might have missed. Then, follow the directions in your user's manual to reset your device. [21] X Trustworthy Source Consumer Reports Nonprofit organization dedicated to consumer advocacy and product testing Go to source
-
Don't open suspicious emails. Merely clicking the link can give the sender a backdoor into your personal information. Delete the message immediately if you don't recognize the sender. If you do recognize them, hover over their name to make sure the email is legit. Webmail providers like Gmail will show you the sender's name and email address. [22] X Research sourceEXPERT TIPTechnology SpecialistBrandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.
Be careful when clicking on links or sharing your personal information online to avoid security breaches. Cybercriminals send emails with malicious links to deceive users. Verify the sender's identity and take precautions before clicking on any links or sharing personal information to prevent unauthorized account access.
-
Avoid sending personal information from your phone. Consider the absolute worst-case scenario of your smartphone getting hacked, then work back from that. Stop using the phone for confidential information of any sort. If you receive confidential information, delete it immediately after reading it. [23] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source
-
Backup your data. Save them to your desktop or laptop computer. After that, back up that data on an external hard drive or flash drive. If you've saved too much stuff on your phone, invest in an automated backup system that will save you the time of copying and emailing individual files. [24] X Research source
How Do I Check If My iPhone Is Hacked?
Community Q&A
-
QuestionI've had over 150+ Androids hacked by a disgruntled ex-friend. He's disabled the pre-installed apps and uploaded his own firmware. How can I get rid of him?R2_d2000Top AnswererThis is very advanced hacking, you should Contact the FBI as they will be the only agency with the tools to catch the hacker.
-
QuestionIs cell phone hacking a federal offence?Community AnswerIt is. It's usually met with 10 years+ jail time, depending on the offender's record with hacking, age, etc. and the lawyer's ability.
-
QuestionCan a hacker access my phone's camera?Community AnswerYes they can. If an app you download has a hacker controlling it, then they can access anything on your phone. They can also turn things off, such as your internet and settings.
Reader Videos
Share a quick video tip and help bring articles to life with your friendly advice. Your insights could make a real difference and help millions of people!
Tips
- Keep your phone with you (or know where it is) at all times.Thanks
- Treat your smartphone the same way you treat your computer. Use caution when opening files, visiting websites, and sharing data.Thanks
- When faced with a list of security questions such as “Name of your first pet” or “Mother’s maiden name”, use a password format (such as random numbers and letters) rather than the actual answer. Hackers know or can find out the actual answers to most security questions.Thanks
Tips from our Readers
- Use strong passcodes and change them periodically. A 6 digit PIN or longer alphanumeric code is harder to crack than a simple 4 digit passcode. Don't use obvious numbers like birthdays or anniversary dates.
- Be cautious when downloading new apps. Only install apps from trusted sources like the Apple App Store or Google Play Store. Check reviews before downloading apps made by lesser known developers.
- Make regular backups of important data and photos. Back up to your computer or a cloud service. That way if your phone is compromised, you won't lose personal information.
- When connecting to public WiFi, use a VPN service. This encrypts your internet traffic to protect against snooping on open networks. Free VPN options are available.
- Keep your phone's software updated. Software updates often include vital security patches to fix vulnerabilities. Turn on automatic updates if available.
- Set up two-factor authentication on important accounts like email and financial services. This adds an extra layer of security beyond just a password.
Warnings
- If you're thinking about hacking someone's phone, reconsider. It's illegal in most countries, including the US and the UK, and could land you in prison for a long time.Thanks
References
- ↑ https://www.av-test.org/en/antivirus/mobile-devices/
- ↑ https://www.wired.com/2015/10/iphone-malware-hitting-china-lets-not-next/
- ↑ https://www.av-test.org/en/antivirus/mobile-devices/android/march-2019/google-play-protect-13.9-191011/
- ↑ https://support.apple.com/en-us/HT204060
- ↑ https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
- ↑ https://www.androidcentral.com/password-protect-your-phone
- ↑ https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
- ↑ https://support.apple.com/explore/find-my-iphone-ipad-mac-watch
- ↑ https://www.google.com/android/find
- ↑ https://itunes.apple.com/us/app/find-my-iphone/id376101648?mt=8
- ↑ https://www.tomsguide.com/us/pictures-story/561-best-apps-finding-smartphones.html#s3
- ↑ https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
- ↑ https://www.usatoday.com/story/travel/advice/2016/12/18/hacking-plugs-ports/95511936/
- ↑ https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
- ↑ https://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure
- ↑ https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
- ↑ https://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure
- ↑ https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
- ↑ https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
- ↑ https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
- ↑ https://www.consumerreports.org/cro/2013/11/remove-personal-data-from-any-device/index.htm
- ↑ https://itservices.uchicago.edu/page/email-safely
- ↑ https://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure
- ↑ https://www.pcmag.com/roundup/225753/the-best-backup-software
About This Article
1. Keep the operating system up to date.
2. Set a secure passcode.
3. Research apps before installing.
4. Set up Find My iPhone or Find My Device.
5. Use secured Wi-Fi connections.
6. Disable Wi-Fi, cellular data, and Bluetooth when not in use.
7. Avoid auto-logins and password-saving.
8. Don't share personal info on social media.
Reader Success Stories
- "What stood out most for me was two things (although the entire information was great). 1st - don't click on links sent to you via text or email if you are not sure of the source. 2nd - your phone cannot be hacked just by someone having your number. Thanks." ..." more