{"id":2810,"date":"2017-03-24T13:12:14","date_gmt":"2017-03-24T13:12:14","guid":{"rendered":"https:\/\/blog.unlockbase.com\/?p=2810"},"modified":"2018-02-16T12:36:24","modified_gmt":"2018-02-16T12:36:24","slug":"is-my-cell-phone-hacked","status":"publish","type":"post","link":"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/","title":{"rendered":"10 Ways You Can Tell if Your Phone Has Been Hacked"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4591\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Ten-ways-you-can-tell-if-your-phone\u2019s-been-Hacked.jpg\" alt=\"Ten ways you can tell if your phone\u2019s been Hacked\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Ten-ways-you-can-tell-if-your-phone\u2019s-been-Hacked.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Ten-ways-you-can-tell-if-your-phone\u2019s-been-Hacked-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">As the old saying goes, once the genie is out of the bottle, there\u2019s no way to put him back. That\u2019s how creator of the internet, <strong>Sir Tim Berners-Lee<\/strong>, has recently stated he feels about the worldwide web which he gifted to the world.<\/p>\n<p align=\"justify\">He has warned that the potential for mobile phones and other devices to be tampered with in far reaching and damaging ways is high if proper protection is overlooked. \u201c<em>When people are thinking about the security of their systems, they worry about people discovering what they are doing,<\/em>\u201d <strong>Tim Berners-Lee<\/strong> said. \u201c<em>What they don\u2019t think about is the possibility of things being changed.<\/em>\u201d<\/p>\n<p align=\"justify\">Citing an example, he said: \u201c<em>If you disrupted traffic data to tell everybody that all the roads south of the river are closed, so everybody would go north of the river, that would cause gridlock and disable the city,<\/em>\u201d<\/p>\n<p align=\"justify\">With <a href=\"https:\/\/www.unlockbase.com\/unlock-phone\/iphone\/\"><strong>iPhones<\/strong><\/a> and <strong>Androids<\/strong> rapidly becoming more advanced, there&#8217;s a growing trend in the number of smart phones being hacked, leaving users extremely vulnerable to compromised personal information. But what are the tell-tale signs your mobile phone has been compromised? If you notice any of the following occurrences over the course of a few days, the chances are <strong>your device has been hacked or compromised<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>1. You have recently noticed your smartphone is slow and clunky<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4593\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/You-have-recently-noticed-your-smartphone-is-slow-and-clunky.jpg\" alt=\"You have recently noticed your smartphone is slow and clunky\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/You-have-recently-noticed-your-smartphone-is-slow-and-clunky.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/You-have-recently-noticed-your-smartphone-is-slow-and-clunky-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">If your mobile feels like your phone is working reluctantly, almost against your will, and is slow, unresponsive, and typing is difficult, it may have become <strong>infected with malware<\/strong>. There are a number of free apps out there that can slow down your phone\u2019s performance, and quickly <strong>fill the memory on your phone<\/strong>. Review your apps carefully, and if there are any you don\u2019t need, or are not sure about, delete them.<\/p>\n<p>&nbsp;<\/p>\n<h2>2. You\u2019re sending or receiving unusual text messages<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4594\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/You\u2019re-sending-or-receiving-unusual-text-messages.jpg\" alt=\"You\u2019re sending or receiving unusual text messages\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/You\u2019re-sending-or-receiving-unusual-text-messages.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/You\u2019re-sending-or-receiving-unusual-text-messages-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">If friends start telling you they are receiving unusual and unwanted text messages from you, or if you are receiving such messages, you could have had a security breach. It\u2019s time to run a reliable <strong>anti-malware app<\/strong> to check if there is a problem.<\/p>\n<p>&nbsp;<\/p>\n<h2>3. New apps have been added to your phone and you didn&#8217;t install them<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4595\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/New-apps-have-been-added-to-your-phone-and-you-didn\u2019t-install-them.jpg\" alt=\"New apps have been added to your phone and you didn't install them\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/New-apps-have-been-added-to-your-phone-and-you-didn\u2019t-install-them.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/New-apps-have-been-added-to-your-phone-and-you-didn\u2019t-install-them-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">There are several <strong>vulnerabilities in operating systems<\/strong> that may let <strong>Android<\/strong> or <strong>iOS<\/strong> malware escalate privileges and gain the ability to circumvent security features. This can result in apps being installed without your permission. These apps can potentially steal your data, record your calls and text messages. They can even hijack your social-media and online banking sessions. Immediately <strong>delete any apps you did not install<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>4. The battery is draining much quicker than it used to<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4596\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/The-battery-is-draining-much-quicker-than-it-used-to.jpg\" alt=\"The battery is draining much quicker than it used to\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/The-battery-is-draining-much-quicker-than-it-used-to.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/The-battery-is-draining-much-quicker-than-it-used-to-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><strong>Malware<\/strong> chews up battery time as it works on code in the background. If you find your battery draining faster than it used to, <strong>check your apps to see how much memory<\/strong> they are consuming. If necessary delete them and install again, or just do without them. A clean fast phone is one that is not overloaded with apps.<\/p>\n<p>&nbsp;<\/p>\n<h2>5. Certain apps have stopped working properly<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4597\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Certain-apps-have-stopped-working-properly.jpg\" alt=\"Certain apps have stopped working properly\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Certain-apps-have-stopped-working-properly.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Certain-apps-have-stopped-working-properly-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">When apps that were working perfectly well, start to misbehave, delete them, <strong>run a virus and malware check<\/strong> and install again from a trusted third party.<\/p>\n<p>&nbsp;<\/p>\n<h2>6. Data or text messaging (SMS) is greatly increased but your usage remains the same<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4598\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Data-or-text-messaging-SMS-is-greatly-increased-but-your-usage-remains-the-same.jpg\" alt=\"Data or text messaging (SMS) is greatly increased but your usage remains the same\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Data-or-text-messaging-SMS-is-greatly-increased-but-your-usage-remains-the-same.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Data-or-text-messaging-SMS-is-greatly-increased-but-your-usage-remains-the-same-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">You know your monthly data usage, but lately it has been considerably higher than you expected. Beware of text messages that can arrive in your inbox inviting you to click on them. Some of these seemingly innocent texts can charge you for every text you receive, and you can receive several a day, which will massively affect your charges as these are premium rate texts. <strong>Delete any texts you do not recognize<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>7. Charges you do not recognize are displaying on your phone<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4599\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Charges-you-do-not-recognize-are-displaying-on-your-phone.jpg\" alt=\"Charges you do not recognize are displaying on your phone\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Charges-you-do-not-recognize-are-displaying-on-your-phone.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Charges-you-do-not-recognize-are-displaying-on-your-phone-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">Criminals love nothing more than to exploit an infected device. They make expensive overseas phone calls via remote party proxying through your device. They can also send <strong>SMS<\/strong> messages to international numbers, or ring up charges in other ways.<\/p>\n<p>&nbsp;<\/p>\n<h2>8. Your phone has been accessing dodgy sites you never tried to view<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4600\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Your-phone-has-been-accessing-dodgy-sites-you-never-tried-to-view.jpg\" alt=\"Your phone has been accessing dodgy sites you never tried to view\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Your-phone-has-been-accessing-dodgy-sites-you-never-tried-to-view.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Your-phone-has-been-accessing-dodgy-sites-you-never-tried-to-view-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">Many business mobiles operate on private networks that ban dubious sites of a certain nature such as <strong>porn sites or pirated content sites<\/strong>. If you notice that your phone has been trying to access such sites and has been blocked, when you yourself have not attempted to visit them, it is more than likely your phone has been infected, and you should <strong>report it to the company\u2019s IT Department<\/strong> before the finger of suspicion falls on you.<\/p>\n<p>&nbsp;<\/p>\n<h2>9. An acquaintance seems strangely well informed about your schedule\/activities<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4601\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/An-acquaintance-seems-strangely-well-informed-about-your-schedule_activities.jpg\" alt=\"An acquaintance seems strangely well informed about your schedule\/activities\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/An-acquaintance-seems-strangely-well-informed-about-your-schedule_activities.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/An-acquaintance-seems-strangely-well-informed-about-your-schedule_activities-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">If you feel someone knows more about you than they should, such as what time you will be at a certain venue, or certain comments you have made to other friends, you may be being cyber stalked. This means a piece of malware has been introduced to your phone for the purposes of discovering everything about your personal, and quite possibly your financial life, too. Again, this you need to <strong>protect yourself by running anti-virus and malware software<\/strong> from a trusted source. It may also be necessary to go the whole way and restore the phone to factory settings, but make sure you back up valuable information, music and pictures to the cloud before doing so.<\/p>\n<p>&nbsp;<\/p>\n<h2>10. Your phone number is all a hacker needs<\/h2>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4602\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Your-phone-number-is-all-a-hacker-needs.jpg\" alt=\"Your phone number is all a hacker needs\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Your-phone-number-is-all-a-hacker-needs.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Your-phone-number-is-all-a-hacker-needs-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\">While it is important to take precautions by regularly checking your phone for malware and viruses, it is also worth bearing in mind that all a determined hacker needs to access your phone is your phone number. We are all guilty of giving away our mobile number too freely. How many business cards do you give to little known acquaintances during the course of the day?<\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><em><strong>Did you know an experienced hacker can use a network interchange service called Signalling System No. 7 (SS7), also known as C7 in the UK or CCSS7 in the USA.<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p align=\"justify\"><strong>CCSS7<\/strong> acts as a broker between mobile phone networks. As calls or text messages are made across networks, <strong>CCSS7<\/strong> handles details such as number translation, <strong>SMS<\/strong> transfer, billing and other back-end duties that connect one network or caller to another. By gaining access to the <strong>CCSS7<\/strong> system, hackers can track a target\u2019s location based on mobile phone mast triangulation, read their sent and received text messages, and log, record and listen into their phone calls, simply by using their phone number as an identifier. For this reason, it\u2019s important to be extremely careful to whom you give your number.<\/p>\n<p>&nbsp;<\/p>\n<h3>How do you protect your mobile device when it has also become your mobile bank, your wallet, social network and more?<\/h3>\n<p>&nbsp;<\/p>\n<p align=\"justify\">The truth is, you can never be fully protected, but an awareness of what hackers might try to do, and what happens when they have successfully hacked your phone will give you the awareness to do something about it quickly.<\/p>\n<p>&nbsp;<\/p>\n<h3>How can you change your service provider if you\u2019re not happy with the service you\u2019re getting?<\/h3>\n<p>&nbsp;<\/p>\n<p align=\"justify\">That\u2019s much easier to answer. Just contact <strong><a href=\"https:\/\/www.unlockbase.com\">Unlockbase<\/a><\/strong>. We have the largest database of mobile phones and service providers internationally. We can quickly, easily and securely unlock your phone and set you free to choose the best provider for your needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; As the old saying goes, once the genie is out of the bottle, there\u2019s no way to put him back. That\u2019s how creator of the internet, Sir Tim Berners-Lee, has recently stated he feels about the worldwide web which he gifted to the world. He has warned that the potential for mobile phones and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[146],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Ways You Can Tell if Your Phone Has Been Hacked<\/title>\n<meta name=\"description\" content=\"Here are the 10 tell-tale signs your mobile phone has been compromised. If you notice any of the following occurrences over the course of a few days, the chances are your device has been hacked or compromised.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Ways You Can Tell if Your Phone Has Been Hacked\" \/>\n<meta property=\"og:description\" content=\"Here are the 10 tell-tale signs your mobile phone has been compromised. If you notice any of the following occurrences over the course of a few days, the chances are your device has been hacked or compromised.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"UnlockBase\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/UnlockBase\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-24T13:12:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-16T12:36:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/You-have-recently-noticed-your-smartphone-is-slow-and-clunky.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unlockbase\" \/>\n<meta name=\"twitter:site\" content=\"@unlockbase\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/\",\"url\":\"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/\",\"name\":\"10 Ways You Can Tell if Your Phone Has Been Hacked\",\"isPartOf\":{\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#website\"},\"datePublished\":\"2017-03-24T13:12:14+00:00\",\"dateModified\":\"2018-02-16T12:36:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/1725f43660c571701eeaa9a3af27c991\"},\"description\":\"Here are the 10 tell-tale signs your mobile phone has been compromised. If you notice any of the following occurrences over the course of a few days, the chances are your device has been hacked or compromised.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.unlockbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Ways You Can Tell if Your Phone Has Been Hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#website\",\"url\":\"https:\/\/www.unlockbase.com\/blog\/\",\"name\":\"UnlockBase\",\"description\":\"Latest news &amp; update about UnlockBase.com server !\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.unlockbase.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/1725f43660c571701eeaa9a3af27c991\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/298378872d33cd901f728453ee208fe0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/298378872d33cd901f728453ee208fe0?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/twitter.com\/unlockbase\"],\"url\":\"https:\/\/www.unlockbase.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Ways You Can Tell if Your Phone Has Been Hacked","description":"Here are the 10 tell-tale signs your mobile phone has been compromised. If you notice any of the following occurrences over the course of a few days, the chances are your device has been hacked or compromised.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/","og_locale":"en_US","og_type":"article","og_title":"10 Ways You Can Tell if Your Phone Has Been Hacked","og_description":"Here are the 10 tell-tale signs your mobile phone has been compromised. If you notice any of the following occurrences over the course of a few days, the chances are your device has been hacked or compromised.","og_url":"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/","og_site_name":"UnlockBase","article_publisher":"https:\/\/www.facebook.com\/UnlockBase\/","article_published_time":"2017-03-24T13:12:14+00:00","article_modified_time":"2018-02-16T12:36:24+00:00","og_image":[{"url":"https:\/\/www.unlockbase.com\/blog\/wp-content\/You-have-recently-noticed-your-smartphone-is-slow-and-clunky.jpg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@unlockbase","twitter_site":"@unlockbase","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/","url":"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/","name":"10 Ways You Can Tell if Your Phone Has Been Hacked","isPartOf":{"@id":"https:\/\/www.unlockbase.com\/blog\/#website"},"datePublished":"2017-03-24T13:12:14+00:00","dateModified":"2018-02-16T12:36:24+00:00","author":{"@id":"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/1725f43660c571701eeaa9a3af27c991"},"description":"Here are the 10 tell-tale signs your mobile phone has been compromised. If you notice any of the following occurrences over the course of a few days, the chances are your device has been hacked or compromised.","breadcrumb":{"@id":"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.unlockbase.com\/blog\/is-my-cell-phone-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.unlockbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"10 Ways You Can Tell if Your Phone Has Been Hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.unlockbase.com\/blog\/#website","url":"https:\/\/www.unlockbase.com\/blog\/","name":"UnlockBase","description":"Latest news &amp; update about UnlockBase.com server !","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.unlockbase.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/1725f43660c571701eeaa9a3af27c991","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/298378872d33cd901f728453ee208fe0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/298378872d33cd901f728453ee208fe0?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/twitter.com\/unlockbase"],"url":"https:\/\/www.unlockbase.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/posts\/2810"}],"collection":[{"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/comments?post=2810"}],"version-history":[{"count":8,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/posts\/2810\/revisions"}],"predecessor-version":[{"id":4606,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/posts\/2810\/revisions\/4606"}],"wp:attachment":[{"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/media?parent=2810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/categories?post=2810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/tags?post=2810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}