{"id":292,"date":"2022-01-10T09:58:32","date_gmt":"2022-01-10T16:58:32","guid":{"rendered":"https:\/\/www.karlstechnology.com\/blog\/?p=292"},"modified":"2022-01-08T10:31:06","modified_gmt":"2022-01-08T17:31:06","slug":"can-your-smartphone-get-hacked","status":"publish","type":"post","link":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/","title":{"rendered":"Can Your Smartphone Get Hacked?"},"content":{"rendered":"\n<p>In short, yes. Many people assume it\u2019s only your computer.\nHowever, through fraudulent messaging clients, hackers can access data,\nlocation, photos and more from your personal or business mobile phones,\ninvading your privacy. And there are a handful of ways they can get sneaky.<\/p>\n\n\n\n<p>According to EFF.org, \u201cThe trojanized apps, including Signal\nand WhatsApp, function like the legitimate apps and send and receive messages\nnormally. However, the fake apps also allow the attackers to take photos,\nretrieve location information, capture audio, and more.\u201d (source: <a href=\"https:\/\/www.eff.org\/press\/releases\/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around\">https:\/\/www.eff.org\/press\/releases\/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around<\/a>)\n<\/p>\n\n\n\n<p>Along with fake apps, you can also receive text messages,\ne-mails, and instant messages with web links from an unknown source. This\ntechnique is called phishing messages and can allow hackers to acquire any\nlogin information you may have saved on your phone. &nbsp;<\/p>\n\n\n\n<p>If you notice an open WIFI when choosing a network, you might\nalso be at risk of your phone being hacked. Unsecured WIFI networks can\nsometimes have snoopers behind the scenes, waiting for users to join and surf\nthe web or log in to highly sensitive (or personal) accounts. This gives them\nample opportunity to steal anything they want. Keep an eye out for URLs with\nunsecured vs secured connections (http: VS https:).<\/p>\n\n\n\n<p>You can protect yourself from these, and other possible\nrisks, by creating strong passwords, using two-factor authentication and setting\nup security questions for your passwords. Be sure to play it safe with any and\nall personal information you add to your phone. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In short, yes. Many people assume it\u2019s only your computer. However, through fraudulent messaging clients, hackers can access data, location, photos and more from your personal or business mobile phones, invading your privacy. And there are a handful of ways they can get sneaky. According to EFF.org, \u201cThe trojanized apps, including Signal and WhatsApp, function [&hellip;]<\/p>\n","protected":false},"author":22392,"featured_media":293,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-292","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computerrepair","tag-hack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Can Your Smartphone Get Hacked? - Computer Repair Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can Your Smartphone Get Hacked? - Computer Repair Blog\" \/>\n<meta property=\"og:description\" content=\"In short, yes. Many people assume it\u2019s only your computer. However, through fraudulent messaging clients, hackers can access data, location, photos and more from your personal or business mobile phones, invading your privacy. And there are a handful of ways they can get sneaky. According to EFF.org, \u201cThe trojanized apps, including Signal and WhatsApp, function [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Repair Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/karlstechnology\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-10T16:58:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-08T17:31:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristin Willis\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristin Willis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/\"},\"author\":{\"name\":\"Kristin Willis\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\"},\"headline\":\"Can Your Smartphone Get Hacked?\",\"datePublished\":\"2022-01-10T16:58:32+00:00\",\"dateModified\":\"2022-01-08T17:31:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/\"},\"wordCount\":257,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png\",\"keywords\":[\"hack\"],\"articleSection\":[\"Computer Repair\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/\",\"name\":\"Can Your Smartphone Get Hacked? - Computer Repair Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png\",\"datePublished\":\"2022-01-10T16:58:32+00:00\",\"dateModified\":\"2022-01-08T17:31:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#primaryimage\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png\",\"width\":1200,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.karlstechnology.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Can Your Smartphone Get Hacked?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"name\":\"Computer Repair Blog\",\"description\":\"Karls Technology Computer Repair\",\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\",\"name\":\"Karls Technology\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"width\":800,\"height\":99,\"caption\":\"Karls Technology\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/karlstechnology\",\"https:\/\/x.com\/karlstechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\",\"name\":\"Kristin Willis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"caption\":\"Kristin Willis\"},\"sameAs\":[\"https:\/\/www.karlstechnology.com\"],\"url\":\"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can Your Smartphone Get Hacked? - Computer Repair Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/","og_locale":"en_US","og_type":"article","og_title":"Can Your Smartphone Get Hacked? - Computer Repair Blog","og_description":"In short, yes. Many people assume it\u2019s only your computer. However, through fraudulent messaging clients, hackers can access data, location, photos and more from your personal or business mobile phones, invading your privacy. And there are a handful of ways they can get sneaky. According to EFF.org, \u201cThe trojanized apps, including Signal and WhatsApp, function [&hellip;]","og_url":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/","og_site_name":"Computer Repair Blog","article_publisher":"https:\/\/www.facebook.com\/karlstechnology","article_published_time":"2022-01-10T16:58:32+00:00","article_modified_time":"2022-01-08T17:31:06+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png","type":"image\/png"}],"author":"Kristin Willis","twitter_misc":{"Written by":"Kristin Willis","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#article","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/"},"author":{"name":"Kristin Willis","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d"},"headline":"Can Your Smartphone Get Hacked?","datePublished":"2022-01-10T16:58:32+00:00","dateModified":"2022-01-08T17:31:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/"},"wordCount":257,"commentCount":0,"publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png","keywords":["hack"],"articleSection":["Computer Repair"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/","url":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/","name":"Can Your Smartphone Get Hacked? - Computer Repair Blog","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png","datePublished":"2022-01-10T16:58:32+00:00","dateModified":"2022-01-08T17:31:06+00:00","breadcrumb":{"@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#primaryimage","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png","width":1200,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.karlstechnology.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Can Your Smartphone Get Hacked?"}]},{"@type":"WebSite","@id":"https:\/\/www.karlstechnology.com\/blog\/#website","url":"https:\/\/www.karlstechnology.com\/blog\/","name":"Computer Repair Blog","description":"Karls Technology Computer Repair","publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.karlstechnology.com\/blog\/#organization","name":"Karls Technology","url":"https:\/\/www.karlstechnology.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","width":800,"height":99,"caption":"Karls Technology"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/karlstechnology","https:\/\/x.com\/karlstechnology"]},{"@type":"Person","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d","name":"Kristin Willis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","caption":"Kristin Willis"},"sameAs":["https:\/\/www.karlstechnology.com"],"url":"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/users\/22392"}],"replies":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/292\/revisions\/294"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media\/293"}],"wp:attachment":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}