1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
3 years ago
12

Everytime my daughter tries to ask for an app, or a money thing inside an app.. The request won't go through. Anybody know how t

o fix this? (IPHONE 6S)
Computers and Technology
1 answer:
Ilya [14]3 years ago
7 0

Answer:

Signs your phone may have been hacked

1. Noticeable decrease in battery life

While a phone’s battery life inevitably decreases over time, a smartphone that has been compromised by malware may start to display a significantly decreased lifespan. This is because the malware – or spy app – may be using up phone resources to scan the device and transmit the information back to a criminal server.

(That said, simple everyday use can equally deplete a phone’s lifespan. Check if that’s the case by running through these steps for improving your Android or iPhone battery life.)

2. Sluggish performance

Do you find your phone frequently freezing, or certain applications crashing? This could be down to malware that is overloading the phone’s resources or clashing with other applications.

You may also experience continued running of applications despite efforts to close them, or even have the phone itself crash and/or restart repeatedly.  

(As with reduced battery life, many factors could contribute to a slower phone – essentially, its everyday use, so first try deep cleaning your Android or iPhone.)

3. High data usage

Another sign of a compromised phone is an unusually high data bill at the end of the month, which can come from malware or spy apps running in the background, sending information back to its server.

4. Outgoing calls or texts you didn’t send

If you’re seeing lists of calls or texts to numbers you don’t know, be wary – these could be premium-rate numbers that malware is forcing your phone to contact; the proceeds of which land in the cyber-criminal’s wallet. In this case, check your phone bill for any costs you don’t recognize.

5. Mystery pop-ups

While not all pop-ups mean your phone has been hacked, constant pop-up alerts could indicate that your phone has been infected with adware, a form of malware that forces devices to view certain pages that drive revenue through clicks. Even if a pop-up isn’t the result of a compromised phone, many may be phishing links that attempt to get users to type in sensitive info – or download more malware.  

6. Unusual activity on any accounts linked to the device

If a hacker has access to your phone, they also have access to its accounts – from social media to email to various lifestyle or productivity apps. This could reveal itself in activity on your accounts, such as resetting a password, sending emails, marking unread emails that you don’t remember reading, or signing up for new accounts whose verification emails land in your inbox.

Explanation:

You might be interested in
Which tool allows users to share code and also serves as a social networking
nikklg [1K]

Answer:

D. GitHub

Explanation:

A P E X

8 0
3 years ago
Which font attribute allows you to change the text from bold to
Sladkaya [172]
F o n t T y p e . Yea it’s font Tyler’s
8 0
3 years ago
Read 2 more answers
QUANTO TEMPO DURA UM CURSO DE INFORMATICA COMPLETO
Arlecino [84]
That's not a complete sentence.<span />
5 0
3 years ago
If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
ehidna [41]

Answer:

Runa, because  she’s like me I r l lol

Explanation:

3 0
3 years ago
Ethical decisions often need to be made within gray areas. for example, should an isp comply with a request from a government fo
Vikki [24]
Matches an IP address

While a business may be legally bound by restrictions such as union contracts, customer privacy policy, and employee confidentiality laws, indeed, there are gray areas inside which ethical decisions need to be made. Many businesses have struggled with decisions like the one mentioned above especially in challenging economic times such as these.



7 0
4 years ago
Other questions:
  • The signal for a turn should be made at least ______ feet before yo wish to make the turn
    8·1 answer
  • How can we lock pubg game from Play Store???​
    12·2 answers
  • What are the advantages of businesses using Twitter ?
    12·1 answer
  • A series of four or five comparisons and calculations that together determine an employee's withholding tax value might be group
    6·1 answer
  • What are two major techniques involved in green computing
    10·1 answer
  • ask user to input a string. (assume length of input string is 1) If the string is lower case, print its upper case If the string
    7·1 answer
  • 14. The term used to describe an attribute that can function like a primary key is a?​
    14·1 answer
  • Hi wanna play fortnite tomorrow add me im batjoker09 no caps or spaces
    13·1 answer
  • Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO T
    11·1 answer
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!