Search
  • Central Europe
  • Middle East
  • Scandinavia
  • Africa
  • UK
  • Italy
  • Spain
  • more
    • Estonia
    • European Union
    • Mobility
    • Hardware
    • Innovation
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Central Europe
    • Middle East
    • Scandinavia
    • Africa
    • UK
    • Italy
    • Spain
    • Estonia
    • European Union
    • Mobility
    • Hardware
    • Innovation
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • eu
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

How to discover and destroy spyware on your smartphone (in pictures)

7 of 7 NEXT PREV
  • What is the difference?

    What is the difference?

    Nuisanceware, also known as Potentially Unwanted Programs (PUP), often comes in software bundles together with legitimate, free programs. These types of software may take your data to sell to ad agencies but are not generally considered dangerous.

    Spyware & stalkerware: These are dangerous and may steal content including photos and videos, intercept calls, allow you to be tracked via GPS, compromise conversations in apps such as Facebook and WhatsApp, and permit attackers to remotely control devices.

    While spyware is a generic term for software able to perform these functions, stalkerware is a term coined for software used by attackers close to you.

    Published: September 6, 2018 -- 10:20 GMT (11:20 BST)

    Caption by: Charlie Osborne

  • Common forms of spyware and stalkerware

    Common forms of spyware and stalkerware

    -SpyPhone Android Rec Pro: This spyware claims to offer "full control" over a smartphone's functions, including listening in to calls, intercepting SMS and MMS messages, sending activity reports to the operator's email address, and more.

    -FlexiSpy: FlexiSpy markets itself using the slogan: "It takes complete control of the device, letting you know everything, no matter where you are."

    -mSpy: mSpy for the iPhone allows users to monitor SMS messages, phone calls, GPS locations, apps including Snapchat & WhatsApp, and also includes a keylogger to record every keystroke made.

    -PhoneSpector: Designed for both Android and iOS handsets, PhoneSpector claims to offer "undetectable remote access."

    Spyera, SpyBubble, Android Spy, and Mobistealth are a few other examples of commercial spyware.

    Published: September 6, 2018 -- 10:20 GMT (11:20 BST)

    Caption by: Charlie Osborne

  • How does my device become infected?

    How does my device become infected?

    Often, spyware and stalkerware require physical access to a victim's device. However, some commercial solutions will also send the victim a crafted, malicious SMS message, email, or link over social media. These messages will contain code which, if executed, will covertly install spyware apps.

    Published: September 6, 2018 -- 10:20 GMT (11:20 BST)

    Caption by: Charlie Osborne

  • What are the warning signs of spyware infection?

    What are the warning signs of spyware infection?

    Your mobile device may demonstrate some signs of infection, such as randomly rebooting, suspicious OS or app behavior, as well as overheating and unexplained battery drain. However, it is important to remember that the core purpose of spyware is to remain undetected, and so there may be no symptoms at all.

    Published: September 6, 2018 -- 10:20 GMT (11:20 BST)

    Caption by: Charlie Osborne

  • How can I remove spyware?

    How can I remove spyware?

    The easiest option is simply to run a malware scan and keep a mobile antivirus solution on your device and up-to-date. However, this may not always be effective.

    You should also make sure operating systems are running their latest version, and if you suspect infection, change all passwords on your online accounts and enable two-factor authentication (2FA). Making sure you have a PIN code or biometrics set up for smartphone access can also help, if you suspect the operator is close to you.

    Published: September 6, 2018 -- 10:20 GMT (11:20 BST)

    Caption by: Charlie Osborne

  • What about particular brands?

    What about particular brands?

    If you think the spyware below is on your device, these instructions may help:

    -FlexiSpy removal: FlexiSpy may masquerade on Android devices under the name "SyncManager." If you find this app on your phone, try to uninstall it directly, and then restart your phone. However, it may also appear under another generic name, and so before deleting any apps, perform a search on the app name first.

    -mSpy: To remove mSpy, instructions are here as long as you have physical access to the device. On the iPhone, you need to access Cydia, search "Installed" and look for "IphoneInternalService." Press modify and remove. Additional options to try are explained here.

    Published: September 6, 2018 -- 10:20 GMT (11:20 BST)

    Caption by: Charlie Osborne

  • If all else fails?

    If all else fails?

    Performing a factory reset and clean install on the device you believe is compromised may help eradicate some forms of spyware and stalkerware. Unfortunately, however, some stalkerware services claim to survive factory resets.

    So, failing all of that, consider ditching your device, as a physical object is not worth sacrificing your privacy for.

    Published: September 6, 2018 -- 10:20 GMT (11:20 BST)

    Caption by: Charlie Osborne

7 of 7 NEXT PREV
Charlie Osborne

By Charlie Osborne | September 6, 2018 -- 10:20 GMT (11:20 BST) | Topic: Security

  • What is the difference?
  • Common forms of spyware and stalkerware
  • How does my device become infected?
  • What are the warning signs of spyware infection?
  • How can I remove spyware?
  • What about particular brands?
  • If all else fails?

If you suspect your device has been tampered with, follow these steps.

Read More Read Less

If all else fails?

Performing a factory reset and clean install on the device you believe is compromised may help eradicate some forms of spyware and stalkerware. Unfortunately, however, some stalkerware services claim to survive factory resets.

So, failing all of that, consider ditching your device, as a physical object is not worth sacrificing your privacy for.

Published: September 6, 2018 -- 10:20 GMT (11:20 BST)

Caption by: Charlie Osborne

7 of 7 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | September 6, 2018 -- 10:20 GMT (11:20 BST) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • The most dangerous iOS, Android malware and smartphone vulnerabilities of 2019

    Malware which resists removal to covert spying on locked smartphones -- mobile threats are becoming more complex and dangerous with each year that passes. ...

  • The biggest Internet of Things, smart home hacks of 2019

    Attackers targeted everything from gas pumps to your smart TV this year.

  • The Nightmare in Silicon Valley: 8 horror technologies that should scare you to death

    Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.

  • Julia programming language, cloud computing, cybersecurity worries: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

  • YubiKey 5Ci: USB-C and Lightning Security Key

    The world’s first Lightning-compatible security key

  • 10 Linux distros: From different to dangerous

    One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're ...

  • 2019's tech, security, and authentication trends

    We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, ...

ZDNet
Connect with us

© 2020 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • CA Privacy/Info We Collect
  • CA Do Not Sell My Info
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums