Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

How to discover and destroy spyware on your smartphone (in pictures)

5 of 7 NEXT PREV
  • What is the difference?

    What is the difference?

    Nuisanceware, also known as Potentially Unwanted Programs (PUP), often comes in software bundles together with legitimate, free programs. These types of software may take your data to sell to ad agencies but are not generally considered dangerous.

    Spyware & stalkerware: These are dangerous and may steal content including photos and videos, intercept calls, allow you to be tracked via GPS, compromise conversations in apps such as Facebook and WhatsApp, and permit attackers to remotely control devices.

    While spyware is a generic term for software able to perform these functions, stalkerware is a term coined for software used by attackers close to you.

    Published: September 6, 2018 -- 10:20 GMT (03:20 PDT)

    Caption by: Charlie Osborne

  • Common forms of spyware and stalkerware

    Common forms of spyware and stalkerware

    -SpyPhone Android Rec Pro: This spyware claims to offer "full control" over a smartphone's functions, including listening in to calls, intercepting SMS and MMS messages, sending activity reports to the operator's email address, and more.

    -FlexiSpy: FlexiSpy markets itself using the slogan: "It takes complete control of the device, letting you know everything, no matter where you are."

    -mSpy: mSpy for the iPhone allows users to monitor SMS messages, phone calls, GPS locations, apps including Snapchat & WhatsApp, and also includes a keylogger to record every keystroke made.

    -PhoneSpector: Designed for both Android and iOS handsets, PhoneSpector claims to offer "undetectable remote access."

    Spyera, SpyBubble, Android Spy, and Mobistealth are a few other examples of commercial spyware.

    Published: September 6, 2018 -- 10:20 GMT (03:20 PDT)

    Caption by: Charlie Osborne

  • How does my device become infected?

    How does my device become infected?

    Often, spyware and stalkerware require physical access to a victim's device. However, some commercial solutions will also send the victim a crafted, malicious SMS message, email, or link over social media. These messages will contain code which, if executed, will covertly install spyware apps.

    Published: September 6, 2018 -- 10:20 GMT (03:20 PDT)

    Caption by: Charlie Osborne

  • What are the warning signs of spyware infection?

    What are the warning signs of spyware infection?

    Your mobile device may demonstrate some signs of infection, such as randomly rebooting, suspicious OS or app behavior, as well as overheating and unexplained battery drain. However, it is important to remember that the core purpose of spyware is to remain undetected, and so there may be no symptoms at all.

    Published: September 6, 2018 -- 10:20 GMT (03:20 PDT)

    Caption by: Charlie Osborne

  • How can I remove spyware?

    How can I remove spyware?

    The easiest option is simply to run a malware scan and keep a mobile antivirus solution on your device and up-to-date. However, this may not always be effective.

    You should also make sure operating systems are running their latest version, and if you suspect infection, change all passwords on your online accounts and enable two-factor authentication (2FA). Making sure you have a PIN code or biometrics set up for smartphone access can also help, if you suspect the operator is close to you.

    Published: September 6, 2018 -- 10:20 GMT (03:20 PDT)

    Caption by: Charlie Osborne

  • What about particular brands?

    What about particular brands?

    If you think the spyware below is on your device, these instructions may help:

    -FlexiSpy removal: FlexiSpy may masquerade on Android devices under the name "SyncManager." If you find this app on your phone, try to uninstall it directly, and then restart your phone. However, it may also appear under another generic name, and so before deleting any apps, perform a search on the app name first.

    -mSpy: To remove mSpy, instructions are here as long as you have physical access to the device. On the iPhone, you need to access Cydia, search "Installed" and look for "IphoneInternalService." Press modify and remove. Additional options to try are explained here.

    Published: September 6, 2018 -- 10:20 GMT (03:20 PDT)

    Caption by: Charlie Osborne

  • If all else fails?

    If all else fails?

    Performing a factory reset and clean install on the device you believe is compromised may help eradicate some forms of spyware and stalkerware. Unfortunately, however, some stalkerware services claim to survive factory resets.

    So, failing all of that, consider ditching your device, as a physical object is not worth sacrificing your privacy for.

    Published: September 6, 2018 -- 10:20 GMT (03:20 PDT)

    Caption by: Charlie Osborne

5 of 7 NEXT PREV
Charlie Osborne

By Charlie Osborne | September 6, 2018 -- 10:20 GMT (03:20 PDT) | Topic: Security

  • What is the difference?
  • Common forms of spyware and stalkerware
  • How does my device become infected?
  • What are the warning signs of spyware infection?
  • How can I remove spyware?
  • What about particular brands?
  • If all else fails?

If you suspect your device has been tampered with, follow these steps.

Read More Read Less

How can I remove spyware?

The easiest option is simply to run a malware scan and keep a mobile antivirus solution on your device and up-to-date. However, this may not always be effective.

You should also make sure operating systems are running their latest version, and if you suspect infection, change all passwords on your online accounts and enable two-factor authentication (2FA). Making sure you have a PIN code or biometrics set up for smartphone access can also help, if you suspect the operator is close to you.

Published: September 6, 2018 -- 10:20 GMT (03:20 PDT)

Caption by: Charlie Osborne

5 of 7 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | September 6, 2018 -- 10:20 GMT (03:20 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OnlyKey hardware security key

    This is the ultimate security key for professionals.

  • SoloKeys Solo V2

    Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums