Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

What are some options if your iphone has been hacked?

We often hear about iPhones and Macs being hacked. In many instances, these breaches occur through iCloud or email accounts compromised by phishing attack or predictable / reused passwords. While no cyber expert can turn back time to undo the hack, there are crucial steps you can take to mitigate the damage and secure your digital life.

Before taking any action, consider whether you want to investigate the breach for potential legal action. This could involve a police report or a lawsuit against the cyber attacker. If so, consult a legal expert and the police first. They will guide you on using a technical expert to document the evidence. Remember, this process is time-consuming and expensive, often costing tens of thousands of dollars due to the complexity of collecting digital evidence. Also, you might need to purchase new devices while preserving the hacked ones as evidence. Act quickly, as the cyber attack may cause further damage over time and as some online logs may be deleted after a short period, such as 30 days.

If You Choose Not to Investigate here are some steps that may help: Taking the following steps may erase potential evidence, so proceed only if you decide against a legal investigation or you have legal advice on which steps are approved to perform.

  1. Disconnect from the Internet: Immediately place your iPhone or Mac in Airplane Mode to cut off remote access by the hacker.
  2. Enable Two-Factor Authentication: Secure your Apple ID, email, and other sensitive accounts with two-factor authentication. A hardware token like Yubico Security Key is recommended due to its robust security (make sure you don’t share or lose the key).
  3. Change Passwords: Using a different secure device, change your Apple ID password and other critical passwords (email, social media, banking and so forth). Employ a password manager with secure two-factor authentication for added protection.
  4. Disconnect Active Sessions: Ensure that you logout all active sessions related to your Apple ID and other accounts.
  5. Securely Backup Your Data: Before wiping your devices, back up your data securely.
  6. Wipe the iPhone/Mac: Perform a factory reset on your devices to eradicate any malicious software.
  7. Avoid Restoring from a Backup: To prevent potential reinfection, avoid restoring your devices from previous backups.
  8. Check for Unusual Activity: Regularly monitor your accounts for any unauthorised access or transactions.
  9. Update iOS/MacOS: Always keep your devices updated with the latest software for security enhancements.

Preventative Measures: If you haven’t experienced a hack, now is the time to add robust two-factor authentication and bolster the security of your accounts. Stay vigilant and proactive in safeguarding your digital presence.

CATEGORIES

Cyber Attack - Cyber Security - Protection

TAGS

hacked iphone - iphone

SHARE

PrevPreviousEssence of Penetration Testing Companies: A Cybersecurity Investigation
NextReverse Engineering in Penetration Testing: A Simple ExplanationNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.