Three Types of Phone Hacking to Watch Out For

By putting the right security measures in place and using common sense, you can minimize the risk of your phone being hacked, but it’s not something you can ever avoid 100 percent. With that in mind, it’s helpful to know what some warning signs of a hack might look like and what you can do in response.
The term “jailbreaking” covers a number of different scenarios, so I’ll go through them one by one, even if there’s some overlap in what you should be looking out for. If you’re unlucky enough to have your device jailbroken, identify it and fix it as quickly as possible to limit the damage.
Spyware Hacking
When it comes to phone hacking, the first scenario that comes to mind for most of us is probably someone else taking control of our device: for example, recording what is said into the phone’s microphone or recording the keystrokes on the keyboard.
On modern smartphones, it’s pretty hard to do this kind of hack remotely — although it’s entirely possible . Exploits can be done via instant messaging or through an app that doesn’t do what it says it does unless it’s been tested by Apple and Google (or you downloaded it).
If an unscrupulous colleague or partner has managed to gain physical access to your phone, the hack is easier to carry out. They can install and hide an app without your knowledge, although even then they will have to bypass the built-in security checks installed by Android and iOS.
For these types of exploits, there are a few warning signs to look out for that indicate hidden app activity: battery drains faster than usual, apps load slowly or crash regularly, and your phone unexpectedly runs out of storage. Both Android and iOS should also warn you when the microphone or camera is in use, so keep an eye out for any unexpected activations.
If you think something is wrong, it’s worth looking through the list of apps to see if there’s anything you don’t recognize: Tap Apps in Settings on Android or iOS. You can delete anything suspicious from the same list.
For a more thorough clean, you can reset your phone, which should remove any spyware or unwanted apps at the same time — just make sure you back up all your files and data first, because this will return your device to its original state. On Android, go to System > Reset options > Erase all data (factory reset) in Settings; on iOS, you’ll need to go to General > Transfer or Reset iPhone > Erase all content and settings in Settings.
Account hacking
Another type of hack is an account breach, where someone else gains access to your apps or accounts. This can expose your data on your computers and the internet, and affect your phone. Your credentials may have come from a data breach , or they may have been tricked out of you by a phishing scam .
As with the previous hack, you’ll want to be on the lookout for suspicious activity, although it may not always be obvious: for example, files or emails appearing and disappearing when they shouldn’t, or notifications about your account that you weren’t expecting.
There are a few ways to dig a little deeper for signs that your accounts may have been compromised. One is to first open your apps in the “recent” or “activity” view: You can do this in Google Drive and in your iCloud Drive account. Everything you see should match the actions you’ve taken.
You can also check which devices your account is active on, which will let you know if someone is logged in as you on a phone, tablet, or computer you don’t own. Most accounts now let you do this in some way — for example, you can go here to see where your Instagram account is active. From the same page, you can set up alerts for new logins and revoke access from any device you can’t identify.
Also, keep an eye on your email inbox to see if you have any alerts about unexpected activity on your account. However, keep in mind that this will only work if your accounts are connected to active and regularly checked email addresses.
If you think one of your accounts has been compromised, change your login details as soon as possible, which should block any unwanted visitors. You should also enable two-factor authentication for any accounts that offer it, which means hackers need more than a username and password to gain access.
SIM or eSIM hacking
Hackers can also attack the SIM card in your phone, whether it’s a physical SIM card or an eSIM. The new eSIM standard, which uses a digital registration instead of a real card, is a more secure option, but it’s still not 100 percent guaranteed to protect you.
The most common type of attack here is a SIM swap attack (also known as a SIM spoofing attack): essentially, your mobile phone number is rerouted to a different SIM card and a different phone. Someone else will receive your calls, text messages, and security codes if you have them set up via SMS.
This can be done with physical SIM cards and eSIMs, and usually involves a hacker convincing your carrier that they are actually you and that you want to switch your number to a new device. They will need some personal information or login credentials to do this, and they may even compromise your account with your network provider (as described above).
Besides being a potentially dangerous hack, you should also spot it pretty quickly: it will seem like your friends and family are ignoring you because you won’t receive any calls or text messages, and you won’t be able to send anything either.
You may also receive alerts from your carrier via email or in-app messages asking you to confirm certain security changes. Be on the lookout for any sudden changes in service (such as no cell signal in areas where you can usually connect).
If you have been SIM swapped, act quickly. Change the passwords on the accounts associated with your number and contact your carrier or eSIM provider as soon as possible, even if you have to borrow someone else’s phone. Once you prove that you are you, the company you are communicating with should be able to reverse the change.