You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

💡 Did you know?

⏺ If you can't accept iCloud Terms and Conditions... Learn more >

⏺ If you don't see your iCloud notes in the Notes app... Learn more >

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

I think my iPhone is hacked, it's not working correctly.

Ex psycho has hacked all electronics doesn’t matter if iPhone or android he seems to get inside how to finally stop iPhone , iPads and etc back to normal


phone over heats , turns background on when not touching it, data usage fast. Apps delete come back drop calls constantly one time in search engine as I was ready to start typing I see all kinds of letters typing self wasn’t me


[Edited by Moderator]

Posted on Jul 28, 2023 10:28 PM

Reply
Question marked as Top-ranking reply

Posted on Jul 29, 2023 12:05 AM

Hack or Prank?


It is highly unlikely that skilled hackers would choose to invest their time and resources into monitoring an unknown person's electronic devices. Firstly, hacking requires a certain level of expertise, knowledge, and tools, which can be quite valuable assets. A proficient hacker typically has a specific agenda, such as gaining unauthorized access to sensitive information, financial gain, or advancing their own personal or political interests.


Monitoring your iPhone would not yield any substantial benefits for a hacker. It would be a trivial and unproductive pursuit that lacks any significant value or purpose. Additionally, hacking activities are often motivated by tangible gains, such as financial rewards, access to valuable data, or the ability to manipulate systems for personal or ideological motives. Monitoring someone's electronic devices would not offer any meaningful advantage or serve a legitimate purpose but pranks would.


Moreover, hacking is an inherently risky activity that can have serious legal consequences. Engaging in unauthorized access, surveillance, or invasion of privacy is illegal in most jurisdictions. Skilled hackers typically operate with more calculated precision, targeting high-value entities or systems that present greater opportunities for achieving their objectives. The risks associated with hacking a device would far outweigh any potential benefits, making it an illogical and unprofitable endeavor.


In summary, hackers typically focus their efforts on more lucrative targets that align with their motives and offer substantial rewards. Investing time and resources into monitoring a device would be an inefficient and unproductive use of their skills, knowledge, and tools.


To protect your devices and personal information, it is crucial to follow good security practices such as using strong and unique passwords, keeping your software up to date, being cautious with email attachments and links, and ensuring that your devices have appropriate security measures in place.



On your iPhone, iPad, or iPod touch: Go to Settings > your name > Password & Security.Tap Turn On Two-Factor Authentication. Then tap Continue and follow the onscreen instructions.


Two-factor authentication for Apple ID - Apple Support (IN)



Beware of Phishing!: Be careful and be smart to --> Recognize and avoid phishing messages, phony support calls ...

It (Phishing) may appear as the image given below.




Gain control of your Apple ID

If your Apple ID password has been changed by someone else, reset your password. Go to appleid.apple.com to update any personal or security information that isn't correct or that you don't recognize.27-Mar-2023


If you think your Apple ID has been compromised



2 replies
Question marked as Top-ranking reply

Jul 29, 2023 12:05 AM in response to Pwhen43

Hack or Prank?


It is highly unlikely that skilled hackers would choose to invest their time and resources into monitoring an unknown person's electronic devices. Firstly, hacking requires a certain level of expertise, knowledge, and tools, which can be quite valuable assets. A proficient hacker typically has a specific agenda, such as gaining unauthorized access to sensitive information, financial gain, or advancing their own personal or political interests.


Monitoring your iPhone would not yield any substantial benefits for a hacker. It would be a trivial and unproductive pursuit that lacks any significant value or purpose. Additionally, hacking activities are often motivated by tangible gains, such as financial rewards, access to valuable data, or the ability to manipulate systems for personal or ideological motives. Monitoring someone's electronic devices would not offer any meaningful advantage or serve a legitimate purpose but pranks would.


Moreover, hacking is an inherently risky activity that can have serious legal consequences. Engaging in unauthorized access, surveillance, or invasion of privacy is illegal in most jurisdictions. Skilled hackers typically operate with more calculated precision, targeting high-value entities or systems that present greater opportunities for achieving their objectives. The risks associated with hacking a device would far outweigh any potential benefits, making it an illogical and unprofitable endeavor.


In summary, hackers typically focus their efforts on more lucrative targets that align with their motives and offer substantial rewards. Investing time and resources into monitoring a device would be an inefficient and unproductive use of their skills, knowledge, and tools.


To protect your devices and personal information, it is crucial to follow good security practices such as using strong and unique passwords, keeping your software up to date, being cautious with email attachments and links, and ensuring that your devices have appropriate security measures in place.



On your iPhone, iPad, or iPod touch: Go to Settings > your name > Password & Security.Tap Turn On Two-Factor Authentication. Then tap Continue and follow the onscreen instructions.


Two-factor authentication for Apple ID - Apple Support (IN)



Beware of Phishing!: Be careful and be smart to --> Recognize and avoid phishing messages, phony support calls ...

It (Phishing) may appear as the image given below.




Gain control of your Apple ID

If your Apple ID password has been changed by someone else, reset your password. Go to appleid.apple.com to update any personal or security information that isn't correct or that you don't recognize.27-Mar-2023


If you think your Apple ID has been compromised



I think my iPhone is hacked, it's not working correctly.

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.