Hacked Devices

An electronic device such as a computer or cell phone that has been compromised by an unauthorized party.

How hackers gain access:

Public Wi-Fi: Hackers can easily access unsecured public Wi-Fi and find your device

Unsecure Apps: Some apps may contain malware that can infect your device especially if you downloaded the app from a unsecured or untrustworthy source.

Phishing Scams: The scammer sends a email or other kind of communication to you pretending to be a legitimate organization and tries to get you to click on a link that installs malware onto your device.

Stolen Device: If your device is stolen and does not have a password set it is easy for a hacker to get into your device.

What do threat actors want?

Threat actors want to retrieve sensitive information on you. They can use this information to commit crimes such as identity theft.

Red flags:

• Your device suddenly begins to behave strangely. For example: new apps appearing, changes to your settings, overheating, or random shutdowns

• Your device begins to receive strange text or emails

• Unusual activity on your credit card or bank accounts

• Contact list suddenly changes

Prevention tips:

• Be careful when downloading new software.

• Do not use public networks.

• Be cautious of links in text messages or emails.

• Do not jailbreak your device.

• If you use a public network, use a VPN (virtual private network).

Previous
Previous

Malware

Next
Next

Business Identity Theft