Navigation and service

Tackling infections on smartphones and tablets

If you suspect malware activity on your tablet or smartphone, you should first try to establish the cause. For example, did you install a particular app shortly before the device started to behave suspiciously? If so, uninstall that program.

If you cannot link the behaviour to a recently installed app, you should install an up-to-date anti-virus program and use it to scan your device. If the software detects a malicious program, uninstall it immediately. If you encounter any problems when uninstalling the program, it is advisable to restart your device in safe mode. The operating system does not start up any programs installed post-manufacture in this mode, only native apps and system functions. You should now be able to remove the malicious program (in Settings -> Apps). The way in which a restart is performed in safe mode is specific to each manufacturer and/or device. You will usually be able to find information on this in your operating instructions or online.

If all the previous steps have been unsuccessful, the only option left is to reset your device to its factory settings, thus restoring it to its original state when it was delivered. But do be aware that you will then lose any apps you have installed yourself and all your personal settings, as well as data like photos, videos and music files. It therefore bears repeating at this point how crucial it is to make regular backups of all important data, including that stored on mobile devices.

For the sake of completeness, we should also mention the USB debugging feature here too, which unlocks extensive opportunities to influence the Android operating system. However, the developer options must be enabled to use this feature. These options are only for experienced technical users who know exactly what they are doing and have in-depth knowledge of the underlying operating system. You must exercise particular caution if going down this route because when developer mode is enabled, this also gives malware more scope to cause damage — and, consequently, increases the potential risks.