1. Transferring a Chrome browser hijacker to iOS is unlikely due to iOS's sandboxing and security measures. However, if a malicious entity has access to your Google account, they could potentially sync harmful settings or extensions.
2. A hacker could theoretically modify Google search settings if they have access to your account. They might redirect searches to harmful sites or inject malicious scripts.
3. If a hacker gains access to your Google account, they could sync malicious extensions or settings, and potentially access your emails, personal data, or even spy on your activities.
To protect yourself, use strong, unique passwords, enable 2-factor authentication, and regularly check your account for unfamiliar activity. If you suspect a breach, change your password immediately and review your account's security settings.