Written by: The Cyber Crisis Commander
Your computer is acting strange. Programs open by themselves. Your mouse moves on its own. You’re getting locked out of accounts. Emails you didn’t send appear in your sent folder. Friends say you sent them weird messages.
Your heart sinks. You think: “I’ve been hacked.”
That panicked feeling is normal. But panic leads to mistakes. What you do in the next hour matters more than what happened before. Fast, calm action can limit damage, protect your money, and restore your security.
This guide tells you exactly what to do, step by step, if you think your computer or phone has been hacked.
Think your device has been hacked right now? Contact Teach Me Tech OC immediately for emergency help. We’ll assess the situation, secure your devices, protect your accounts, and restore your security. Available for urgent situations in Orange County. Call us at teachmetechoc.com or phone us now!
Quick Overview: Your Action Plan
We’ll cover:
- Signs your device has been hacked
- Immediate actions to take (first 10 minutes)
- Securing your accounts (next hour)
- Cleaning your device (next steps)
- Preventing future hacks
- When to get professional help
Signs Your Computer Has Been Hacked
Definite signs (act immediately):
- Mouse cursor moves by itself
- Programs open or close without you touching anything
- You’re locked out of accounts with password errors
- Emails in your sent folder you didn’t send
- Pop-ups claiming your computer is infected (especially with phone numbers)
- Antivirus software has been disabled
- New programs installed that you didn’t add
- Webcam light turns on when you’re not using it
Possible signs (investigate further):
- Computer running much slower than normal
- Browser redirects to weird websites
- New toolbars in your browser you didn’t install
- Friends saying you sent them strange messages
- Unexpected password reset emails
- Bank showing charges you didn’t make
- Hard drive working constantly even when idle
Not necessarily hacked:
- Computer running slow (might just need cleaning)
- Battery draining fast (could be old battery)
- Unexpected ads (might be adware, not a hack)
Signs Your Phone Has Been Hacked
Definite signs:
- Apps you didn’t install appearing
- Contacts receiving messages you didn’t send
- Locked out of your Apple ID or Google account
- Bank charges you didn’t make
- Phone bill shows unfamiliar charges
- Two-factor authentication codes arriving when you didn’t request them
Possible signs:
- Battery draining much faster than normal
- Phone very hot even when not in use
- Data usage suddenly much higher
- Apps crashing frequently
- Phone running extremely slow
- Strange pop-ups appearing
Immediate Actions: First 10 Minutes
Step 1: Disconnect from internet immediately
Computer: Unplug ethernet cable or turn off WiFi. This stops the hacker from accessing your device remotely.
Phone: Turn on Airplane Mode or turn off WiFi and cellular data.
Why this matters: Many hacks require internet connection. Disconnecting cuts the hacker’s access.
Step 2: Don’t panic and don’t delete anything yet
Take a breath. You need to be methodical. Randomly deleting files or programs might erase evidence you need or make things worse.
Step 3: Write down what you noticed
Document everything strange:
- When did you first notice problems?
- What exactly is happening?
- What were you doing before problems started?
- Did you click any links or download anything recently?
This information helps determine what happened and what to do.
Step 4: Check bank accounts from different device
Use a different device (phone if computer is hacked, tablet if phone is hacked) to check your bank accounts. Look for unauthorized charges.
If you see fraudulent charges, call your bank immediately. They can freeze accounts and issue new cards.
Securing Your Accounts: Next Hour
Step 5: Change critical passwords from clean device
Using a device you know is safe, change passwords for:
- Email (do this first—hackers use email to reset other passwords)
- Banking and credit cards
- Investment accounts
- PayPal, Venmo, or other payment apps
- Social Security account
- Health insurance portal
Create strong, unique passwords for each account. Use a password manager.
Step 6: Enable two-factor authentication
Add two-factor authentication (2FA) to every account that offers it, especially:
- Email accounts
- Banking
- Social media
- Shopping accounts
This prevents hackers from accessing accounts even if they have your password.
Step 7: Check account recovery options
Hackers often change recovery email addresses and phone numbers so you can’t get back into your accounts.
Log into accounts and verify:
- Recovery email addresses are yours
- Phone numbers are correct
- Security questions haven’t been changed
Step 8: Alert your contacts
If your email or social media was compromised, notify your contacts:
- Don’t click links in messages from me
- Don’t send money if “I” request it
- My account was hacked and I’m working to secure it
This protects your friends and family from scams using your identity.
Cleaning Your Computer
Step 9: Run antivirus scan in Safe Mode
Windows:
- Restart computer
- Press F8 repeatedly during startup
- Select “Safe Mode with Networking”
- Run full antivirus scan
- Delete any threats found
Mac:
- Restart and hold Shift key during startup
- Release when login window appears
- Run antivirus scan
- Delete threats found
Why Safe Mode: This prevents malware from loading, making it easier to detect and remove.
Step 10: Check installed programs
Look through installed programs for anything you don’t recognize:
Windows: Settings > Apps > Apps & Features
Mac: Finder > Applications folder
Uninstall suspicious programs. Google any program names you don’t recognize before deleting—some are legitimate system programs.
Step 11: Check browser extensions
Hackers often install malicious browser extensions.
Chrome: Three dots menu > Extensions > Remove suspicious ones
Safari: Safari menu > Preferences > Extensions > Uninstall unknown ones
Firefox: Three lines menu > Add-ons and themes > Remove suspicious ones
Step 12: Reset browsers to default settings
This removes malicious settings while keeping your bookmarks.
Chrome: Settings > Reset settings > Restore settings to defaults
Safari: Safari menu > Clear History > All History
Firefox: Help > More Troubleshooting Information > Refresh Firefox
Step 13: Update everything
Update your operating system, browsers, and all software. Updates often include security patches for vulnerabilities hackers exploit.
Cleaning Your Phone
Step 14: Check installed apps
Look for apps you didn’t install. Delete anything suspicious.
iPhone: Hold app icon > Remove App
Android: Settings > Apps > Uninstall suspicious apps
Step 15: Check app permissions
Review what permissions apps have. Remove unnecessary permissions.
iPhone: Settings > Privacy > Review each category
Android: Settings > Apps > Permissions
Apps shouldn’t have access to contacts, camera, or microphone unless they need them for their function.
Step 16: Factory reset if necessary
If problems persist after removing suspicious apps, factory reset is the nuclear option that removes everything.
Back up photos and contacts first. Factory reset erases everything.
iPhone: Settings > General > Transfer or Reset iPhone > Erase All Content and Settings
Android: Settings > System > Reset options > Erase all data
Preventing Future Hacks
Use strong, unique passwords: Never reuse passwords across accounts. Use a password manager to generate and store strong passwords.
Enable two-factor authentication everywhere: This single step blocks most hacking attempts.
Keep software updated: Install updates promptly. They fix security vulnerabilities.
Install reputable antivirus software: Use Norton, McAfee, Bitdefender, or Windows Defender (free with Windows).
Be suspicious of links and attachments: Don’t click links in unexpected emails or texts. Don’t open attachments unless you were expecting them.
Don’t use public WiFi for sensitive activities: Public WiFi isn’t secure. Don’t access banking or enter passwords on public networks.
Back up important data regularly: If your device is compromised, you can restore from backup without losing everything.
Review account activity monthly: Check bank statements and credit card charges regularly for anything suspicious.
When to Get Professional Help
Get professional help if:
- You can’t remove malware despite following these steps
- Computer continues acting strangely after cleaning
- You’re not comfortable performing these steps yourself
- Financial accounts have been accessed
- Sensitive business or medical information was on the device
- You need to preserve evidence for law enforcement
- You need confirmation the device is truly clean
Professional help costs $100-300 but provides peace of mind and thorough cleaning.
What to Tell Your Bank
If hackers accessed financial accounts:
Information your bank needs:
- When you discovered the hack
- What unauthorized charges you see
- Whether you shared any passwords or codes
- If you still have access to your accounts
Your bank will:
- Freeze affected accounts
- Issue new cards
- Reverse fraudulent charges
- Set up fraud monitoring
- Possibly file police report
You’re not liable for fraudulent charges if you report them promptly.
Reporting the Hack
Report to:
FBI Internet Crime Complaint Center: ic3.gov (for all hacks)
Federal Trade Commission: IdentityTheft.gov (if identity theft involved)
Local police: File report if significant money lost
Credit bureaus: Place fraud alert if personal information stolen
Reporting helps authorities track cybercrime patterns and may help your case if you suffered financial loss.
Common Questions Answered
Q: Can hackers see me through my webcam? Yes, if they installed remote access software. Cover your webcam with tape or a webcam cover when not in use.
Q: Should I pay ransom if my files are encrypted? No. Paying doesn’t guarantee you’ll get your files back and encourages more attacks. Restore from backup instead.
Q: Will factory reset remove all hacks? Usually yes. Factory reset removes everything, including malware. But back up important files first.
Q: How did hackers get access? Common methods: clicking malicious links, downloading infected files, using weak passwords, falling for phishing, using compromised public WiFi.
Q: Is my device permanently compromised? No. Once cleaned and with new passwords, your device is secure. Follow prevention steps to stay safe.
SEO Summary
Keywords: “computer hacked” / “phone hacked” | Density: 1.5% | Title: | Headings: 9/15
Intent: Emergency response, device recovery | Searches: “signs hacked,” “malware removal,” “phone acting strange”
We’ll Clean Your Device and Restore Your Security
Dealing with a hack is stressful. We’ll handle the technical work so you can focus on protecting your accounts.
What we’ll do:
- Emergency same-day service in Orange County
- Complete security assessment of affected device
- Remove all malware and suspicious programs
- Check all accounts for unauthorized access
- Change all passwords to strong, unique ones
- Set up password manager for future protection
- Enable two-factor authentication on all accounts
- Install and configure professional antivirus software
- Secure your network to prevent future attacks
- Check all devices on your network for infection
- Restore system to full security
- Review account statements for fraudulent charges
- Help you report to appropriate authorities
- Create personalized security plan
- Provide ongoing monitoring and support
- Teach you prevention techniques
- Test device thoroughly to confirm it’s clean
Cities we serve:
Irvine, Mission Viejo, Laguna Hills, Dana Point, Aliso Viejo, San Juan Capistrano, Rancho Santa Margarita, Lake Forest, Laguna Niguel, Newport Beach, Costa Mesa, San Clemente, Tustin, Foothill Ranch, Laguna Beach, and all other Orange County locations.
Don’t try to handle this alone when you’re stressed. Contact Teach Me Tech OC today, and let’s get your device cleaned, your accounts secured, and your peace of mind restored.
