Technology
Your phone got hacked and now someone's got control of it. What to do immediately

Data breaches are becoming alarmingly common, and it’s no longer just massive corporations or government agencies in the crosshairs. Hackers are setting their sights on personal devices like your smartphone. Think about it, your phone holds a staggering amount of your personal information.
From emails and text messages to banking apps, social media and even your photos, it’s a treasure trove for cybercriminals.
The numbers back up the growing threat. The FBI’s Internet Crime Complaint Center received nearly 56,000 reports of personal data breaches last year. California, the most populous state, topped the charts for the most complaints, according to the Identity Theft Resource Center (ITRC). These stats are more than just numbers — they’re a wake-up call.
GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE
A man realizing that his phone has been hacked. (Kurt “CyberGuy” Knutsson)
So, what happens if you find your phone has been hacked?
It’s a nightmare scenario. Your phone feels off — battery drains faster than usual, strange pop-ups appear, apps you didn’t download show up, or you’re suddenly locked out. Maybe it’s sluggish, overheating or making unexpected calls or texts. Your mind races: “What did they see? What can they do with my information? Can I even fix this?”
Take a deep breath. Yes, it’s unsettling, but you’re not powerless. Knowing what steps to take — and in what order — can make a huge difference in regaining control and stopping the damage. Let’s walk through exactly what to do if your phone gets hacked, so you can protect yourself and bounce back stronger.

Illustration of a scammer hacking into someone’s phone. (Kurt “CyberGuy” Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS — CYBERGUY PICKS
Step 1: Remove malicious software
Even if hackers had only brief access to your device, assume they’ve seen sensitive data. Your first task is to remove any malware or spyware.
1. Use strong antivirus software: The easiest and most effective way to start is by installing and running strong antivirus or antivirus software. Avoid unfamiliar apps, as some pose as antivirus tools but are actually malware in disguise. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
After installation, run a full device scan. This will search for hidden threats like spyware, ransomware, or keyloggers that could compromise your information further. Once the scan identifies malicious files, follow the app’s instructions to quarantine or remove them. Be sure to double-check the app’s log to confirm all suspicious activity has been addressed. Most antivirus tools offer real-time protection to monitor for threats as they occur. Turn this feature on to reduce the risk of reinfection. Antivirus programs are only as effective as their latest updates. Cybercriminals continuously develop new malware, so keeping your antivirus database current ensures it can detect the newest threats.
2. Factory reset if needed: If the antivirus software fails to fully restore your phone’s functionality — such as fixing issues like freezing, slowdowns or unexpected shutdowns — you may need to perform a factory reset on your iPhone or Android. A factory reset wipes all data from your phone, returning it to its original state when it left the manufacturer. Before resetting, create a backup of your important files. However, ensure the backup itself is free of malware. Use antivirus software to scan backups before restoring them. Most phones offer a simple reset option in their settings menu under “System” or “General Management.” Consult your device manual or manufacturer’s website for detailed instructions.
3. Seek professional help: If you’re not confident in your ability to remove malware or reset your phone, reach out to a trusted professional. Visit the Apple Store, Microsoft Store or an authorized service provider for your phone brand. Explain your situation and ask for a thorough inspection and cleaning of your device. Many retailers offer comprehensive diagnostic and repair services.
4. Abandon hardware only as a last resort: In rare cases, malware can deeply embed itself into a device, making complete removal nearly impossible. If your phone continues to exhibit signs of infection despite using antivirus tools, factory resets and professional help, you may need to replace it. Ensure you completely wipe the device before disposing of it to prevent any residual data from falling into the wrong hands. When setting up a new device, take extra precautions to secure it, such as enabling two-factor authentication and keeping all software up to date.

Illustration of someone trying to remove malware from their device. (Kurt “CyberGuy” Knutsson)
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
Step 2: Don’t reset passwords prematurely
Resist the urge to immediately change passwords on a compromised device. Hackers might still have access and could intercept your new credentials, potentially locking you out again. Instead, follow these steps:
Thoroughly clean and secure your device first:
Use a trusted, secure device for password resets:
- Use another device you own or borrow a friend’s or family member’s computer to reset your password.
- If possible, also use a different network than your compromised phone to avoid potential network-level attacks.
Prioritize critical accounts:
- Start with your email, as it’s often used for password resets on other accounts.
- Move on to financial accounts, social media and other sensitive services.
Create strong, unique passwords:
- Use a combination of uppercase and lowercase letters, numbers and symbols.
- Aim for at least 12 characters in length.
- Avoid using personal information or common phrases.
- Consider using a password manager to generate and store complex, unique passwords for each account. They encrypt your password database, adding an extra layer of security.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Someone entering a password on their device. (Kurt “CyberGuy” Knutsson)
Setting up passkeys on iPhone and Android
As we’ve seen, traditional passwords present numerous security challenges — including susceptibility to breaches and phishing attacks — along with the inconvenience of remembering complex combinations. Even with best practices in place, passwords can still be stolen or misused.
This is where passkeys come into play. As data breaches become increasingly common, adopting passkeys can significantly enhance your security. Unlike passwords that require you to remember a string of characters, passkeys utilize biometric authentication or a PIN to streamline the login process while providing protection against unauthorized access.
Benefits of using passkeys
Enhanced security: Passkeys are resistant to phishing attacks and reduce the risk of credential theft since they cannot be easily guessed or stolen like traditional passwords.
Convenience: With biometric authentication, logging into apps and websites becomes faster and easier — eliminating the need to remember complex passwords.
Cross-device functionality: Passkeys work seamlessly across different devices linked to the same account — providing a unified login experience.
Here’s how to set up passkeys on both iPhone and Android devices so that you can secure your personal information.
Setting up a passkey on iPhone
- Check compatibility: Ensure your iPhone is running iOS 16 or later; passkeys are integrated into iCloud Keychain.
- Enable iCloud Keychain: Go to Settings > [Your Name] > iCloud > Under Saved to iCloud, tap Passwords. In iOS 17 or earlier, tap Passwords and Keychain. > Tap Sync this iPhone to turn on iCloud Passwords & Keychain. You might be asked for your passcode or Apple Account password.
- Ensure that two-factor authentication is also enabled for your Apple ID. Open Settings > Tap your name at the top > Select ‘Sign-In & Security’ > Tap ‘Turn On Two-Factor Authentication’ > Follow the on-screen instructions to complete the setup.
How to create a Passkey on iPhone
- Open the app or website where you want to create a passkey.
- Select the option to sign in or create an account.
- When prompted for a password, choose the option to use a passkey instead.
- Follow the on-screen instructions to authenticate using Face ID, Touch ID, or your device passcode.
- Your passkeys will be stored in iCloud Keychain and automatically sync across all devices signed in with the same Apple ID.
Setting up a passkey on Android
Settings may vary depending on your Android phone’s manufacturer.
- Check compatibility: Ensure your device is running Android 9 (Pie) or later; most modern Android devices support passkeys.
- Set up Google Password Manager: Go to Settings > Tap your Name or initial > Google > Manage Your Google Account > Security. Then, scroll down to find the Passkeys section and tap on it.
How to create a passkey on Android:
Settings may vary depending on your Android phone’s manufacturer.
- When signing into an app or website, select the option for passwordless login.
- Follow the prompts to create a passkey; this may require biometric verification (fingerprint or facial recognition) or a PIN.
- Once created, your passkeys will be stored in Google Password Manager and synced across all devices linked to your Google account.
HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM
Step 3: Secure your assets and prevent identity theft
With your device clean, focus on protecting your financial and personal information.
Credit reports: Contact Equifax, Experian and TransUnion to place a fraud alert and security freeze on your credit reports. Regularly check your credit reports for unauthorized activity. Contacts: Equifax: 1-800-525-6285,Experian: 1-888-397-3742, TransUnion: 1-800-680-7289.
Financial institutions: Update passwords and enable two-factor authentication (2FA) on your bank accounts. This enhances the security of your financial information. Inform your financial institutions about the breach. Some banks allow you to set up verbal passwords for added security.
Driver’s license: Submit a Fraud Review of Driver License/Identification form to your local Department of Motor Vehicles (DMV).
Social Security account: Create a my Social Security account if you don’t already have one. Monitor it for any unusual activity. Regularly review your account statements to ensure no unauthorized changes have been made.
Taxes: Obtain an Identity Protection (IP) PIN from the IRS to prevent fraudulent tax filings. File your taxes early to outpace potential fraudsters. You can get an IP PIN by visiting the IRS official website.
Identity theft protection: Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.
Kurt’s key takeaways
Getting your phone hacked is a sobering reminder of how vulnerable we are these days. Yet, the experience doesn’t have to be catastrophic if you act quickly and methodically. Start by addressing the immediate threat of malware, secure your accounts and assets, and implement proactive measures to prevent future breaches. Think of these steps as your digital emergency kit — essential tools to help you regain control when things go wrong. Remember, your digital security is only as strong as the precautions you take today.
Have you ever experienced a phone hack or dealt with a cybersecurity breach? Share your story, your questions or the steps you took by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.

Technology
Solar-powered robot zaps weeds without chemicals

NEWYou can now listen to Fox News articles!
Out in the California sun, a new kind of farmhand is hard at work. Powered by solar energy and guided by artificial intelligence, the solar-powered weeding robot for cotton fields is offering farmers a smarter and more sustainable way to tackle weeds.
This technology is arriving just in time, as growers across the country face a shortage of available workers and weeds that are becoming increasingly resistant to herbicides.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
JOB-KILLING ROBOT LEARNS AT WORK, AND IT’S COMING TO THE FACTORY FLOOR
Solar-powered Element robot (Aigen)
Why farmers need alternatives to herbicides and manual labor
Farmers everywhere are facing a tough reality. There simply aren’t enough people willing to do the backbreaking work of weeding fields, and the weeds themselves are getting harder to kill with chemicals. Many farmers would rather avoid using herbicides, but until now, they haven’t had a practical alternative. Kenny Lee, CEO of Aigen, puts it plainly: farmers don’t love chemicals, but they use them because it’s often the only tool available. Aigen’s mission is to give them a better choice.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
How Aigen’s solar-powered weeding robot uses AI to fight weeds
Aigen’s Element robot is designed to meet the real-world needs of modern agriculture. It runs entirely on solar power, which means farmers can save money on fuel while also reducing their environmental impact. The robot uses advanced AI and onboard cameras to spot and remove weeds with impressive accuracy, all without damaging the crops. Its rugged design allows it to handle rough terrain and changing weather, and it can work alongside other robots, communicating wirelessly to cover large fields efficiently. The Element robot isn’t limited to cotton; it’s also being used in soy and sugar beet fields, showing just how versatile this technology can be.

Solar-powered Element robot (Aigen)
Real-world results: Aigen’s robot at work on California cotton farms
At Bowles Farm in California’s Central Valley, Element robots are already proving their worth. These robots are keeping cotton fields weed-free without the need for chemicals, freeing up workers to focus on more skilled tasks and helping farmers manage their operations more efficiently. The technology is not just a promise for the future. It’s delivering real results today.
Top benefits of solar-powered weeding robots for sustainable farming
Switching to solar-powered, AI-driven robots brings a host of benefits. Farmers no longer need to rely on herbicides, which leads to cleaner crops and healthier soil. Labor costs can drop since workers can shift from manual weeding to supervising and maintaining the robots. The robots also collect valuable data on crop health, pests and diseases, giving farmers better information to make decisions. And because the robots run on solar power, farms can reduce their carbon footprint while saving money on energy.

Solar-powered Element robots (Aigen)
Kurt’s key takeaways
Aigen’s Element robot goes beyond being just another cool piece of technology. It really shows what can happen when farming and innovation come together. As more growers start using solar-powered robots like this, chemical-free fields are moving from wishful thinking to something we can actually achieve.
Would you feel comfortable trusting a robot to handle important tasks and help shape the future of how we grow our food? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
It’s the final day of Prime Day 2025, and the deals are still live

Editor’s note: That’s a wrap, folks! As Prime Day 2025 draws to a close, we’ll no longer be updating this article with additional deals and insights. Plenty of great deals remain, however, so be sure to check out all of our Prime Day coverage for anything you may have missed.
There are mere hours left of Amazon’s extended Prime Day extravaganza. And, yeah, we’re a little exhausted, but after days of lightning deals and all-time low prices, these discounts won’t be around for much longer. So, if you’ve been hesitant to jump on these laptop deals before heading back to school, now’s your time to act. Typically, Prime Day is your last opportunity to take advantage of bottom-dollar prices until Black Friday / Cyber Monday, so it may be a while before you see prices plummet on a gadget you’re interested in buying.
Really, there’s an overwhelming amount of Prime Day deals, so to make things easier to navigate, we’ve organized all of our favorites by category below. That will allow you to quickly find exactly what you’re looking for — or even uncover a deal on something you didn’t know you wanted.
Tablet and e-reader deals
Soundbar and Bluetooth speaker deals
Verge favorites and other miscellaneous deals
Update, July 11th: Added several more deals, including those for Final Fantasy VII Rebirth, Razer’s Kishi Ultra mobile controller, and Amazon’s Fire TV Soundbar Plus.
Technology
Massive scam spreading designed to trick you and steal your money

NEWYou can now listen to Fox News articles!
Look at the image. That’s not the real Omaha Steaks. It’s from a fake site designed to steal your money.
It’s happening all over the internet right now. You see a great deal on name-brand stuff, a new smartwatch, fancy cookware, maybe some designer jeans, and you click.
Everything looks real. The logos, the layout, even Apple and Google Pay are options. But it’s a scam, and now your credit card info is out there.
5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER
A massive scam targeting you
Silent Push analysts uncovered thousands of fake websites posing as trusted stores like Apple, Michael Kors, Harbor Freight, REI, Omaha Steaks and more. There’s a massive global scam operation that uses real payment methods on fake checkout pages. Like thousands-of-sites massive.
An image of a fake “Omaha Steaks” website designed to steal your money. (Silent Push)
The twist? The criminals, likely based in China, take your payment and ghost you. No product. No refund. No customer service. Total fake-out.
I’M A TECH PRO AND THESE ARE MY SECRETS TO BETTER FLIGHTS AND LUXURY TRAVEL
They cloned sites
They’re copying everything. Logos, layouts, even the checkout process, so much so that you’d swear you were on the real REI website while buying $10 trail shoes.
But there were some sites with mismatched logos and products. A Harbor Freight clone showed Wrangler jeans.

FILE PHOTO: A photo illustration of a person shopping online. (iStock)
Even worse: These scam sites are popping up faster than hosting companies can take them down. Many are still up right now.
IS YOUR PHONE LISTENING TO EVERYTHING YOU SAY? IT’S COMPLICATED
Don’t fall for it
- Slow down and read. Misspelled words, weird domain names like “nordstromltems.com” (that’s an L, not an I) or random products are huge red flags.
- Use virtual cards or a credit card. Not a debit card. You need that fraud protection.
- Stick to the real URL. Skip the sketchy ads. Always type the URL in yourself.
- If the deal looks too good, it probably is a scam. Period.

FILE PHOTO: A photo illustration of a cybercriminal. (iStock)
Bottom line: If the deal looks like it crawled straight out of your dreams, it’s probably from your nightmares. Slow down before you click “buy.”
Now you know this is happening. This scam campaign is a big one, and you need to stay sharp. Help save the world and use the icons below to share this know-how with your family and friends.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
- National radio: Airing on 500+ stations across the US – Find yours or get the free podcast.
- Daily newsletter: Join 650,000 people who read the Current (free!)
- Watch: On Kim’s YouTube channel
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
-
Business1 week ago
See How Trump’s Big Bill Could Affect Your Taxes, Health Care and Other Finances
-
Politics1 week ago
Video: Trump Signs the ‘One Big Beautiful Bill’ Into Law
-
Culture1 week ago
16 Mayors on What It’s Like to Run a U.S. City Now Under Trump
-
News1 week ago
Video: Who Loses in the Republican Policy Bill?
-
Science1 week ago
Federal contractors improperly dumped wildfire-related asbestos waste at L.A. area landfills
-
Technology1 week ago
Meet Soham Parekh, the engineer burning through tech by working at three to four startups simultaneously
-
World1 week ago
Russia-Ukraine war: List of key events, day 1,227
-
Politics1 week ago
Congressman's last day in office revealed after vote on Trump's 'Big, Beautiful Bill'