In the event that your device has been compromised
Despite your best efforts, it is possible that your device or data may at some point suffer an attack. This can occur in multiple ways; the device may have been mistakenly left at a public place, or a hacker may have been successful in obtaining login information through a large-scale attack. Regardless of the reason, there are certain steps which you can take to mitigate the damages in the event that your device has been compromised.
Has your device been hacked?
First, you will need to verify that your devices or accounts have been hacked. Hackers will commonly use hacked devices to remotely send e-mails, place phone calls, or use SMS messaging. Therefore, users should carefully monitor their outgoing and incoming data. Also, watch out for when your device connects to a Wi-Fi hotspot, as some hotspots are hosted by hackers.
Have you received any strange texts from unknown senders? One method by which hackers attempt to hack smartphones is...