contador javascript Skip to content
Contact :

Tablets with viruses? Remove them with these steps


Tablets with viruses? Remove them with these steps

Written by

April 20, 2016

android malware

On other occasions we have talked about security as one of the axes around which the new generations of tablets and smartphones that go on the market are turning. Hackers have better resources to attack and manufacturers respond by adding elements such as biometric markers or more complex patterns to ensure adequate user protection. On the other hand, we also remember the improvements in operating systems and the emergence of applications that encrypt all the information we host in the terminals as well as content of all kinds, or eliminate all sensitive data that can be used for fraudulent purposes.

However, sometimes, however much we have protected and safe models thanks to the action of elements such as antivirus, it is inevitable that at some point, our platforms will be infected by some harmful element that in many cases, is not too important but that in others, they can become very annoying and greatly hinder the normal use we make of the supports. Then we tell you how to act in case of being attacked by a virus or trojan and what complementary measures to take to expose ourselves as little as possible to the risks.


The symptoms

Although some types of malware They can go unnoticed and many others are based on the theft of content without the user being aware of it, there are some indicators that show us that the terminal may be infected: slow running, the inability to open specific applications or the loss of some items As passwords, they can be a first indication that our tablet or smartphone has been attacked. On the other hand, there are other viruses that show their existence from the moment of the attack through the massive arrival of ads, messages that offer us supposed rewards or the sudden appearance of other contents that prevent us from using the device in a normal way.

We have a virus on our tablet, now what?

1. Off

When we are certain that our models have been infected, we must act quickly. The first thing will be to turn off the terminal the device to start it in the «Safe Mode«. In the vast majority of models, it is enough to press the shutdown button in an interval of between one and two seconds and with this, all installed applications, including those that have the harmful element, are stopped running.

safe mode display

2. Start in Safe Mode

Once we have accessed the options of the shutdown menu of our terminal and have activated the safe mode, we touch on it. Once inside, we can access all the characteristics of the terminal and investigate more thoroughly in the Settings menu Once we have accessed this last tab, we will enter «Applications«, Where we can see the complete list of everything that is installed.

3. Search

Once we are on the screen that shows us all the information related to the apps, we will begin to look for who is responsible for having been attacked. This phase is very simple since we can identify the deceased through his name or his icon. Within this menu, files that have names such as «may be suspiciousxdeghost»Or similar after the name of the application. Clicking on it, we can uninstall completely. If we continue with doubts, checking the download history, we can also find the virus.

Samsung Tab S2 home