PDF download Download Article
The ultimate guide to protecting your iPhone or Android from hackers and malware
PDF download Download Article

With all the reports about malware attacks and data breaches, no one can blame you for wanting to protect your cell phone from hackers. You can take steps to secure your phone, improve your password smarts, and protect your data. Nothing is fool-proof, but a little bit of know-how will improve your chances of hack-proofing your phone.

Method 1
Method 1 of 3:

Secure Your Phone

PDF download Download Article
  1. Don't download just any app. Read recommendations from trustworthy sources like Consumer Reports , CNET , and AV-TEST . Make sure that you choose an antivirus from a reputable antivirus company that you recognize, such as Norton, McAfee, Avast, or Bitdefender. Antivirus apps from reputable companies are better at detecting viruses than apps from unknown companies. [1]
    • For the most part, the iOS software is difficult to hack. However, some versions might have vulnerabilities. The best you can do is update your software as soon as new versions are released and be careful which apps you can install. [2]
    • Don't rely on Google Play Protect as your antivirus. Play Protect has performed poorly in tests. [3]
    • Password-protect your security software, if possible.
  2. Pick something that's complex, yet easy to remember. Avoid birthdays, pets' names, bank PINs, or part of your phone number. Follow the instructions at Apple or Android support to set yours up.
    • To set a passcode for your iPhone, choose a code that consists of six digits, four digits, or an alphanumeric code you set yourself. [4]
    • Avoid easy unlocking methods. Don't be tricked by fingerprint- or facial recognition. Hackers can copy your fingerprints from drinking glasses or use photographs of you.
    • Don't set your phone to automatically unlock when you're at home or when it's near other smart devices. If someone breaks into your home or gets a hold of your smart watch, your phone will be vulnerable. [5]
    • For an Android phone, start at the menu button from the home screen. Tap “Settings,” then “Security,” and then “Screen Lock.” The actual words might be different depending on your phone's brand name. Choose between Pattern Unlock, a personal PIN, or an alphanumeric password. After that, choose how long you want your phone to wait before locking. [6]
    Advertisement
  3. Download apps only from a reputable seller or site, such as Apple's App Store or Google Play. Be careful if you use an Android phone. Google doesn't vet its apps as carefully as Apple. Read reviews from Consumer Reports , Wired , or CNET before downloading any third-party apps. [7]
  4. Settings or apps allow you to remotely lock and erase your phone if it's stolen. If you have a newer phone, you don't need to download anything. Control your iPhone through “Find My Phone” in iCloud. [8] Remotely secure your Android phone through your Google account with Android Device Manager. [9]
    • If you have an older iPhone, get the Find My iPhone app from iTunes. [10] Download Find My Phone for older Android models. [11] Both apps are free.
  5. Unsecured connections don't have lock icons near their listings. Avoid them, if you can, and use your phone's secure mobile connection. Otherwise, install a virtual private network (VPN), which directs your traffic through encrypted connections. Even if you're using a VPN, never access your bank account or vital records on an unsecured connection. [12]
    • Secured connections have a lock icon, usually located across from the name of the network.
  6. A hacker can't hack your phone if it's not connected to the internet. Follow the instructions in your user's manual or support section of the phone manufacturer's website.
    • Turning on Airplane Mode is an easy way to turn off all communication on your phone with the push of a button.
  7. These include the ports on your computer and in your car (if applicable). Hackers can hack public USB charging ports, like the ones you may see in a coffee shop or airport, and steal personal information. [13]
    • For this reason, it's a good idea to bring your electrical outlet adapter in addition to your USB cable if you're traveling. Hackers can't hack your phone through your USB adapter.
  8. As soon as Apple or Android tells you an update is ready, download and install it. Many hackers take advantage of vulnerabilities in out-of-date operating systems. Updates patch these holes and make your phone more secure. [14]
  9. Advertisement
Method 2
Method 2 of 3:

Password Sense

PDF download Download Article
  1. Choose a password that's hard to guess . Use complex combinations of letters, numbers, and symbols. The more complex you make the password, the more secure it is. Use uppercase letters in the middle of your password and throw in an obscure symbol to further complicate it.
    • Avoid using obvious passwords like birthdays, anniversaries, or consecutive sequences like “1, 2, 3, 4, 5.” Don't use letters that spell out words such as your mom's maiden name or your pet's name. [15]
    • Password-protect your voicemail, Wi-Fi connection, and individual apps that you use for banking and email. When securing your voicemail, follow the instructions on your service provider's website. [16]
    • Consider using a Password manager. A password manager can generate and securely store passwords for all of your accounts. With a password manager, you'll only have to remember one very strong password.
  2. Use this as an unbreakable rule with everyone—best friends, partners, children, etc. When you're in public, glance around to make sure no one is looking over your shoulder. Finally, avoid entering a password near a closed-circuit television (CCTV) camera. You don't know who's watching on the other end. [17]
  3. It might seem convenient for you, but it makes hacking as easy as opening your browser. Take the time to enter your usernames and passwords, especially on sites that you use for banking and other sensitive business. Type slowly to avoid getting locked out.
    • If you're really pressed for time or just can't remember too many passwords, use a password manager. These programs store your passwords and fill them in when you access each site. You can lock the manager when you're not using it. Better yet: you'll only have to remember one password. [18]
  4. Having the same password for your email, bank account, and social media apps makes a hacker's job too easy. Take the time to think up creative mixtures of letters, numbers, and symbols for each account. Use a password generator backed up by a password manager to make this less of a burden on you. [19]
    EXPERT TIP

    Brandon Phipps

    Technology Specialist
    Brandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.
    Brandon Phipps
    Technology Specialist

    Avoid using the same password for multiple websites. If your login information on one website is compromised, hackers can potentially gain access to your accounts on other sites. Be sure to create unique passwords for each site to reduce your risk of being hacked, especially if a site seems like it has questionable security.

  5. Create a password update schedule. Whether it’s weekly, monthly or quarterly, have a plan and stick to it. You could even enter a coded reminder in your calendar.
  6. Advertisement
Method 3
Method 3 of 3:

Protect Your Data

PDF download Download Article
  1. It's okay to use your real name for networking but leave it at that. Never provide your address, phone number, mother's maiden name, etc. on your profile. Avoid even “safe” information like your favorite song or the book you're currently reading. Hackers can use any of this information to hack you and steal your identity. [20]
  2. Photos can reveal a lot about you, allowing a potential hacker to steal your identity. Notes from your morning meeting can provide a wealth of info for industrial spies. Transfer your photos and any sensitive text-based files to your laptop or desktop computer.
    • Reset your device when you want to recycle it (similar to reformatting a hard drive). First, perform encryption to scramble any data you might have missed. Then, follow the directions in your user's manual to reset your device. [21]
  3. Merely clicking the link can give the sender a backdoor into your personal information. Delete the message immediately if you don't recognize the sender. If you do recognize them, hover over their name to make sure the email is legit. Webmail providers like Gmail will show you the sender's name and email address. [22]
    EXPERT TIP

    Brandon Phipps

    Technology Specialist
    Brandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.
    Brandon Phipps
    Technology Specialist

    Be careful when clicking on links or sharing your personal information online to avoid security breaches. Cybercriminals send emails with malicious links to deceive users. Verify the sender's identity and take precautions before clicking on any links or sharing personal information to prevent unauthorized account access.

  4. Consider the absolute worst-case scenario of your smartphone getting hacked, then work back from that. Stop using the phone for confidential information of any sort. If you receive confidential information, delete it immediately after reading it. [23]
  5. Save them to your desktop or laptop computer. After that, back up that data on an external hard drive or flash drive. If you've saved too much stuff on your phone, invest in an automated backup system that will save you the time of copying and emailing individual files. [24]
  6. Advertisement

How Do I Check If My iPhone Is Hacked?


Community Q&A

Search
Add New Question
  • Question
    I've had over 150+ Androids hacked by a disgruntled ex-friend. He's disabled the pre-installed apps and uploaded his own firmware. How can I get rid of him?
    R2_d2000
    Top Answerer
    This is very advanced hacking, you should Contact the FBI as they will be the only agency with the tools to catch the hacker.
  • Question
    Is cell phone hacking a federal offence?
    Community Answer
    It is. It's usually met with 10 years+ jail time, depending on the offender's record with hacking, age, etc. and the lawyer's ability.
  • Question
    Can a hacker access my phone's camera?
    Community Answer
    Yes they can. If an app you download has a hacker controlling it, then they can access anything on your phone. They can also turn things off, such as your internet and settings.
See more answers
Ask a Question
      Advertisement

      Reader Videos

      Submit a Video Tip!

      Share a quick video tip and help bring articles to life with your friendly advice. Your insights could make a real difference and help millions of people!

      Submit a Video

      Tips

      • Keep your phone with you (or know where it is) at all times.
      • Treat your smartphone the same way you treat your computer. Use caution when opening files, visiting websites, and sharing data.
      • When faced with a list of security questions such as “Name of your first pet” or “Mother’s maiden name”, use a password format (such as random numbers and letters) rather than the actual answer. Hackers know or can find out the actual answers to most security questions.
      Show More Tips

      Tips from our Readers

      The advice in this section is based on the lived experiences of wikiHow readers like you. If you have a helpful tip you’d like to share on wikiHow, please submit it in the field below.
      • Use strong passcodes and change them periodically. A 6 digit PIN or longer alphanumeric code is harder to crack than a simple 4 digit passcode. Don't use obvious numbers like birthdays or anniversary dates.
      • Be cautious when downloading new apps. Only install apps from trusted sources like the Apple App Store or Google Play Store. Check reviews before downloading apps made by lesser known developers.
      • Make regular backups of important data and photos. Back up to your computer or a cloud service. That way if your phone is compromised, you won't lose personal information.
      • When connecting to public WiFi, use a VPN service. This encrypts your internet traffic to protect against snooping on open networks. Free VPN options are available.
      • Keep your phone's software updated. Software updates often include vital security patches to fix vulnerabilities. Turn on automatic updates if available.
      • Set up two-factor authentication on important accounts like email and financial services. This adds an extra layer of security beyond just a password.
      Submit a Tip
      All tip submissions are carefully reviewed before being published
      Name
      Please provide your name and last initial
      Thanks for submitting a tip for review!
      Advertisement

      Warnings

      • If you're thinking about hacking someone's phone, reconsider. It's illegal in most countries, including the US and the UK, and could land you in prison for a long time.
      Advertisement

      About This Article

      Article Summary X

      1. Keep the operating system up to date.
      2. Set a secure passcode.
      3. Research apps before installing.
      4. Set up Find My iPhone or Find My Device.
      5. Use secured Wi-Fi connections.
      6. Disable Wi-Fi, cellular data, and Bluetooth when not in use.
      7. Avoid auto-logins and password-saving.
      8. Don't share personal info on social media.

      Did this summary help you?
      Thanks to all authors for creating a page that has been read 1,431,742 times.

      Reader Success Stories

      • Anonymous

        Dec 10, 2016

        "What stood out most for me was two things (although the entire information was great). 1st - don't click on ..." more
      Share your story

      Is this article up to date?

      Advertisement