How to hack the hackers

If your phone is acting strange, over-heating with excessive battery and data use, it may mean that you are being tracked, or you have one or more malignant, unwanted apps or files installed on your device.

If you suspect your device has been hacked, check it for suspicious apps and files you don't remember creating.

The following advice is designed to make you smarter.

How to Protect Your Device

The first thing to do is to frustrate whoever or whatever is trying to track you. Put your phone into flight mode or turn off data now and then. This will interrupt the flow of data, which will confuse whoever is trying to track you.

Then get to work.

Delete Suspicious Apps

If you installed a third-party app right before your phone started acting weird, there's a good chance that the app was infected with malware. Delete it immediately.

Check your apps list for anything you don't recognize, especially if they have the word "tracker" in the name, that means it's probably stalkerware. If apps start asking for permissions they don't need, like permission to access and modify files, that's a warning sign that they could be infected with malware.

Only install apps from trusted stores like the Google Play Store or Apple App Store. Double-check those as well by putting the developer's name in a web search, because bad apps sometimes get past even their vetting.

If you catch a new, unfamiliar app icon on your phone, this could be the result of spyware. Spotting unauthorized apps on your device can sometimes be tough — especially if you have a lot of apps on your phone. Make sure to review all the apps on your device under phone Settings. 

Make sure you know what apps are on your phone and what permissions you have given.

Hack (random check for spyware): if you use Tik Tok, open any post. Go to the share arrow (lower right hand) and hit it. This will show ‘share to’ options. Slide over to ‘more’ and hit the blue ‘more’ icon. This will show ‘more’ apps that are used for sharing on your phone. If you see a suspicious app, then delete it.

Check Your Location Settings

Someone might not even need to install an app on your phone to track you --- some apps that come with your smartphone are set up to share your location by default.

People can also track your location with Google Maps. To see if you're sharing your location with anyone via Google Maps, open the app, tap your account icon, then tap Location Sharing. If nobody is listed there, you're not sharing your location with anyone. If there are people listed, you can remove them or turn location sharing off.

It's a good idea to review permissions for all of your apps to make sure none of them are sharing your location. Apps that need your location to function, like Google Maps, should be set up to only share your location when they're being used.

Use Protection

Anti-malware, antivirus, and VPN apps can all help protect you and your data from being tracked. Scanning your phone regularly increases the odds that you'll find malware before things get too serious, and a VPN can also confuse trackers.

Factory Reset

If all else fails, you can try a full factory reset of your smartphone – but only as a last resort. This should revoke any access a malicious hacker gained through malware and delete any suspect apps that could be on your phone by returning everything to the way it was when your phone was fresh out of the box. Make sure to do a selective back up of your phone data if you choose to do a full factory reset, although you may run the risk of reimporting the problem.

For tips on factory reset, check on Google for your phone make and model.

Be cautious with unknown or unexpected texts

If you’ve received a surprise text from an unknown number beware — it could be a phishing or a hybrid spy-phishing scam. In these situations, the text may contain strange messages, urgent calls-to-action, or links that entice you to reply or tap. If you are not sure of a text or email then don’t open it and delete it immediately.

Regularly review location-sharing settings

When you enable location-sharing for an app to access all the features, don’t forget to turn it off again. It’s common to leave permissions on when you don’t need to.  

Good housekeeping: delete old, unused, or unknown apps

Running a device with loads of old, unused or even unknown apps is a security risk, especially if you don’t keep them all up-to-date. Check your device apps regularly and remove ones that you no longer use. Don’t flood your phone with useless apps.




Comments

Popular posts from this blog

Kickboxing: PNG’s national sport

WW2 plane found in Madang

Ovu ga'hoe! Back cover reveal!

Amazing! Parallel universes!

Ricky Mitio's book for the ages