CHECK your device for the sinister warning signs that you’ve been hacked.
A leading cyber-expert has revealed the red flags that your phone, laptop or desktop computer has been “compromised”.
This is extremely serious: a hacked device means crooks can spy on you and even control your machine.
And that could lead to you being defrauded, blackmailed, extorted, or having your funds stolen.
It can sometimes be difficult to tell when you’ve been hacked.
But Jamie Akhtar, CEO and co-founder of CyberSmart, revealed some key clues that The U.S. Sun readers should look out for.
“Suspicious network activity can take a few forms,” Jamie told us.
“It could be that your search history shows sites you don’t remember visiting.”
This is a key sign that your device or network has been compromised somehow.
If you’re seeing strange websites in your history, it could mean that someone is spying on you – or even controlling your machine.
The second sign Jamie warned about is “browser redirects”.
“When your browser takes you to a completely different website than the one you searched for,” Jamie explained.
If this happens, it could mean that your Wi-Fi network or your browser has been hacked.
Try totally uninstalling your browser and reinstalling it to see if the problem is fixed.
If you can’t seem to clear the issue, it could mean there is something very seriously wrong with your device.
There’s also a third sign your machine is under attack.
“In the worst-case scenario, you might experience session hijacking, where it appears someone else is controlling your device (it’s usually the hacker),” Jamie warned.
“If you spot any of these things, there’s a good change you’ve been compromised. “
You should take urgent action if you think your device has been compromised.
Try using cybersecurity software to identify any malware on your machine.
Consider reinstalling your browser or even totally wiping your computer and starting from fresh.
And make sure your Wi-Fi router settings have the best possible encryption security and complicated passwords.
Similarly, make sure your key online accounts (like Google, Apple or Microsoft) have strong and unique passwords.