我们的智能手机是令人难以置信的个人设备。可以访问任何有犯罪倾向的人可能想要的所有信息。这就是为什么手机被盗是一个巨大的隐私问题。
但是,您无需因恶意类型而丢失您的手机(lose your phone)来窃取您所有的多汁数据。黑客有多种方法可以监视您的手机或完全控制它。他们也不总是明目张胆地这样做,因此您必须密切注意可能表明您的Android设备已被黑客入侵的各种奇怪症状。这是判断您的Android是否被黑客入侵的方法。
手机速度慢(Phone Is Slow),电池没电太快(Battery Dies Too Quickly)
随着时间的推移,所有Android手机都会变慢并失去电池容量。(battery capacity)然而,这不会在一夜之间发生。当您的手机感染了代表黑客发送信息的恶意软件时,您通常会注意到电池寿命显着下降。
在这种情况下,您的手机可能会响应缓慢并且总是摸起来很热,即使您可能有一段时间没有使用它了。这(something )不是黑客攻击的确凿证据,但手机性能和电池寿命突然下降肯定有问题。因此,值得检查恶意软件。
您的数据莫名其妙地消失了
虽然有些人很幸运拥有无限的移动数据包,但大多数人的数据计划有限。如果您突然发现自己的数据用完比平时更快,则可能表明您的Android已被黑客入侵。
如果黑客通过您的网络摄像头监视您,情况尤其如此!即使对于那些没有数据上限的人,也值得检查您的每月数据使用趋势。每月消费量的可疑上升可能是黑客入侵的迹象。
奇怪,可疑的弹出窗口
许多人可能会忽略的一个明显迹象是屏幕上出现不寻常的弹出广告或奇怪的窗口。在移动网络浏览器中获取垃圾邮件恶意弹出窗口是一回事,但在网络浏览器之外的任何地方获取它们绝对不正常。
被黑客入侵的手机会产生看起来像是来自操作系统的弹出窗口和警告。这些通常会报告您的手机感染了恶意软件(技术上是正确的),并且您应该单击特定链接来解决问题。该链接要么是网络钓鱼(phishing)尝试,要么会导致安装更多恶意软件。
你从未见过的应用程序
大多数 Android 用户可能都有一个应用程序抽屉,里面装满了他们完全忘记的应用程序。所以这可能是一个很难发现的迹象。尽管如此,还是有必要时不时地检查一下你的应用程序抽屉,看看里面是否有你不记得安装过的奇怪应用程序。
您的浏览器主页更改
如果您打开移动浏览器并立即转到不是您指定的登录页面(或浏览器的默认页面),这是一个巨大的危险信号。这意味着您的浏览器已被劫持!
这在多个层面上都很糟糕。您不仅可以被重定向到真实网站的虚假版本,而且您在浏览器中输入的任何内容都可以被观看和捕获。这包括密码等敏感信息!
您的手机在您不知情的情况(Your Knowledge)下拨打电话(Makes Calls)或发送短信(Sends Texts)
在每个月底检查您的通话记录总是一个好主意。无论是在您不知情的情况下捕捉您的孩子使用您的手机,还是查看黑客是否出于非法目的从您的手机拨打电话或发送短信。如果您在电话记录中发现不是您拨打的电话或消息活动,则这是给定电话可能受到损害的另一个迹象。
您的关联帐户失控
智能手机通常会连接我们所有的在线帐户。无论是银行、社交媒体、电子邮件还是在线游戏。信息和访问凭据都在那里。
当黑客控制了您的手机或开始监视您的行为时,这就是通往您其他帐户的门户。如果您看到来自陌生地方的登录信息或密码已重置的警告,则很可能是一部被盗的手机是入侵的来源。这意味着仅仅更改密码是不够的。
摆脱黑客
因此,让我们假设您的手机确实受到了损害。你该怎么办?以下是我们的建议:
- 首先,将手机置于飞行模式并取出SIM卡和 SD 卡(如果适用)。
- 在您的Android(Android)或iPhone上执行恢复出厂设置。请注意,您将丢失手机上的所有数据!
- 将 SD 卡放入计算机读卡器并扫描恶意软件。
- 删除要保留在 SD 卡上的所有数据(例如照片),然后格式化 SD 卡。
- (Set)从头开始设置手机,就好像它是新的一样。
- 更换 SIM 卡和 SD 卡。
在大多数情况下,这足以清除手机中的恶意软件或病毒。但是,有些形式的恶意软件可以在出厂重置后仍然存在。例如,xHelper可以修改手机通常只读的系统分区。
虽然这不太可能,但如果您发现新重置的手机尽管采取了预防措施,但再次受到损害,您可能必须使用最新固件的新副本重新刷新它。最严重的恶意软件感染可能需要完全更换手机。
防止电话黑客攻击的提示
如果您的手机现在没有恶意软件,或者您想首先防止黑客入侵,这里有一些实用提示:
- 始终为您拥有的每个在线帐户使用唯一的密码。
- 使用密码管理器(password manager)为您的帐户生成强密码。
- 始终使用密码或某种屏幕锁定来保护您的手机。
- 除非您了解风险,否则请勿在官方应用商店之外获取手机或安装应用程序。
- 远离狡猾的网站,通常是那些推送非法或成人内容的网站。
- 使用公共充电点时,请使用无法传输数据的专用电源线。一些病毒感染可能通过USB发生。
- (Avoid)除非您 100% 确定它已被验证为安全,否则请避免在手机上安装自定义固件。
- 定期检查您的应用权限和安全设置。不要(Don)将相机或位置访问权限等权限授予不需要它来完成工作的应用程序。卸载不让您选择关闭这些权限的应用程序。
这些只是一些一般提示。你最好的防御是对你用手机做什么,你把它带到哪里,谁可以访问它,以及你与哪些网站和软件进行交互保持理智。
认真对待
您的智能手机是您拥有的最有价值的物品之一,而不仅仅是因为它很贵!这些设备是我们生活的中心,几乎包含我们所有的信息,并且一直在我们身边。当他们受到损害时,这是一个严重的、毁灭性的问题。每当您想知道是否应该或不应该点击该链接或安装特定应用程序时,请记住这一点。是否值得冒风险?
How To Tell If Your Android Phone Is Hacked
Our smartрhones are incredibly perѕonal devices. With accеss to just about all the information anyone of a criminal bent could want. This is why getting уour phоne ѕtolen is a huge privacy issue.
However, you don’t need to physically lose your phone for nefarious types to steal all your juicy data. Hackers have various ways to spy on your phone or to take complete control of it. They don’t always do it blatantly either, so you’ll have to keep any eye out for various strange symptoms that could indicate your Android device has been hacked. Here’s how to tell if your Android is hacked.
The Phone Is Slow and the Battery Dies Too Quickly
All Android phones tend to slow down and lose battery capacity over time. However, this doesn’t happen overnight. When your phone is infected with malware that’s sending information on behalf of the hacker, you’ll often notice a significant drop in battery life.
In this situation, your phone might be slow to respond and always feel hot to the touch, even though you might not have used it for a while. This isn’t conclusive evidence of hacking, but a phone that suddenly takes a nosedive in performance and battery life definitely has something wrong with it. So it’s worth checking for malware.
Your Data Inexplicably Disappears
While some people are lucky enough to have unlimited mobile data packages, most people are on a limited data plan. If you suddenly find yourself running out of data more quickly than usual, that could be a sign that your Android is hacked.
This is especially true if the hacker is watching you through your webcam! Even for those who don’t have data caps, it’s worth checking your monthly data usage trends. A suspicious uptick in monthly consumption could be a sign of hacking.
Weird, Suspicious Pop Ups
One obvious sign that plenty of people might ignore is unusual pop up ads or strange windows appearing on your screen. It’s one thing to get spammy malicious pop ups in a mobile web browser, but it’s absolutely not normal to get them anywhere outside of a web browser.
Hacked phones can spawn popups and warnings that look like they come from the operating system. These usually report something like your phone is infected with malware (technically true) and that you should click on a particular link to fix the issue. That link is either a phishing attempt or will lead to the installation of even more malware.
Apps You’ve Never Seen Before
Most Android users probably have an app drawer that’s filled with apps they’ve completely forgotten about. So this can be a hard sign to spot. Still, it’s worth going through your app drawer from time to time to see whether there are any weird apps in there you don’t remember installing.
Your Browser Home Page Changes
If you open your mobile browser and are immediately taken to a landing page that isn’t the one you’ve specified (or the default for your browser) that’s a huge red flag. It means your browser has been hijacked!
This is bad on multiple levels. Not only could you be redirected to fake versions of real sites, but whatever you type into your browser could be watched and captured as well. This includes sensitive information such as passwords!
Your Phone Makes Calls or Sends Texts Without Your Knowledge
It’s always a good idea to check your call records at the end of each month. Whether it’s to catch your kids using your phone without your knowledge or to see if a hacker has been making calls or sending texts from your phone for illicit purposes. If you spot calls or messaging activity in your phone records that you didn’t make, it’s another sign that a given phone could be compromised.
Your Linked Accounts Go Haywire
Smartphones usually have all our online accounts connected to them. Whether it’s banking, social media, email or online gaming. The information and access credentials are all there.
When a hacker takes control of your phone or starts spying on what you’re doing, that’s a gateway to your other accounts. If you’re seeing logins from strange places or warnings that your password was reset, a compromised phone might very well be the source of the intrusion. Which means that simply changing your passwords won’t be enough.
Getting Rid of Hackers
So let’s assume your phone really is compromised. What should you do? Here’s what we suggest:
- First, put the phone into airplane mode and remove the SIM card and SD card if applicable.
- Perform a factory reset on your Android or iPhone. Be warned, you’ll lose all the data on the phone!
- Put the SD card into a computer card reader and scan it for malware.
- Remove any data (such as photos) you want to keep on the SD card, then format the SD card.
- Set up the phone from scratch, as if it were new.
- Replace your SIM card and SD card.
In most cases that should be enough to clear the phone of malware or viruses. However, there are forms of malware out there that can survive a factory reset. For example, xHelper can modify the usually read-only system partition of the phone.
While it’s unlikely, if you find your newly-reset phone compromised again despite precautions, you may have to reflash it with a new copy of the latest firmware. The very worst malware infections could require completely replacing the phone.
Tips to Prevent Phone Hacking
If your phone is now free of malware or you want to prevent a hack in the first place, here are some practical tips:
- Always use unique passwords for each online account you have.
- Use a password manager to generate strong passwords for your accounts.
- Always protect your phone with a passcode or some sort of screen lock.
- Don’t root your phone or install apps from outside the official app store unless you understand the risks.
- Stay away from dodgy websites, usually ones pushing illegal or adult content.
- When using a public charging point, use a special power-only cable that can’t carry data. Some virus infections can happen via USB.
- Avoid installing custom firmware on your phone unless you’re 100% sure it has been verified as safe.
- Review your app permissions and security settings on a regular basis. Don’t give permissions for things like camera or location access to apps that don’t need it to do their job. Uninstall apps that don’t give you the option to turn these permissions off.
These are just some general tips. Your best defense is to be sensible about what you do with your phone, where you take it, who has access to it, and what websites and software you interact with.
Taking Things Seriously
Your smartphone is one of the most valuable items you own, and not just because it was expensive! These devices are at the center of our lives, contain virtually all our information and are always on us. When they are compromised it’s a serious, devastating problem. Keep that in mind whenever you’re wondering whether you should or shouldn’t tap on that link or install a specific app. Is it worth risking what’s at stake?