Hacked or cloned Apple devices are a result of your information being intercepted and practically stolen when you think you are using a secure network, or the utilization of multiple hacking measures to obtain access to your mobile device.