Signs & Symptoms of a Hacked Smartphone

by Tommy Doc, Demand Media

Smartphones contain personal information useful to hackers and identity thieves.

Smartphones contain personal information useful to hackers and identity thieves. Images

iPhone users have reported strange SMS text messages received as an initial attempt to hack a smartphone. Texts that appear as a single square or other strange characters are attempts by hackers to download spyware or malware onto your device. These attacks are similar to malicious email viruses, however on a mobile device the SMS only has to be received by the smartphone, with no download action taken by the user. If a hacker accesses a device of a friend who has you in their address book, it can be easily passed along to your number. Check with your contacts to see if they have experienced similar texts, and notify them of a potential hack.

Unauthorized Use

A hacker who gains control of your mobile device will be able to send texts, make calls, or access the internet. This will alter your call history, sent text messages, or other functions unbeknownst to the user. Monitor your call, text, and camera function history, and if you notice anything you did not perform yourself, then your phone is remotely under the control of another user. Experienced hackers will cover their tracks, so if you suspect a hack check your phone records with your service provider to detect any unauthorized use.

If you are experiencing ticking or other noises during your phone calls that are normally not an issue, it could be a sign someone is attempting to access your phone. Abruptly dropped calls could be a problem with your service provider, or a failed hacking attempt. If your service provider cannot provide an explanation as to why these events are happening all of the sudden, a hacking attempt can be considered as the culprit.

Diagnostic Test

If you suspect malicious software may be installed on your smart phone, take it into a retail location of your service provider for a diagnostic test. They should be able to detect and eliminate any intrusive software installed on the phone, or in the worst case scenario, restore it to factory settings.


Sara Fawley

Sara Fawley

Hello my name is Sara Fawley. I was born and raised in San Diego, Ca Oct 1965. I lived there until I was 19, then moved with my now ex-husband to Texas where I lived for the next 25 years. I have two grown sons who are married and have lives and families of their own. My current husband and I now live in a small town in Arkansas with our dachshund Shabar. I owned and antiques and collectibles shop but closed it down in September 2013 after having a heart attack. I still buy and sell antiques and collectibles and make handmade natural gemstone jewelry which we sell at shows and festivals. I don't recall ever not knowing that there was more than just us out there. My first experience happened when I was a young child and was visited by my godfather "Grandpa Clyde" at the time of his death and for three weeks after that. I have seen one other full bodied apparition in my life and had several other minor experiences that left me scratching my head.I am not an investigator but have a huge thirst for knowledge. I am always looking up this or that legend, myth or story I hear or sometimes I just have random thoughts and look them up to see if anyone else thinks the same way. I am very analytically minded and always like to get to the bottom of things.
Sara Fawley

Latest posts by Sara Fawley (see all)