Tablets with viruses? Remove them with these steps
April 20, 2016 at 5:00 p.m.
On other occasions we have talked about security as one of the axes around which the new generations of tablets and smartphones that go on the market are turning. Hackers have better resources to attack and manufacturers respond by adding elements such as biometric markers or more complex patterns to ensure adequate user protection. On the other hand, we also remember the improvements in operating systems and the emergence of applications that encrypt all the information we host in the terminals as well as content of all kinds, or eliminate all sensitive data that can be used for fraudulent purposes.
However, sometimes, however much we have protected and safe models thanks to the action of elements such as antivirus, it is inevitable that at some point, our platforms will be infected by some harmful element that in many cases, is not too important but that in others, they can become very annoying and greatly hinder the normal use we make of the supports. Then we tell you how to act in case of being attacked by a virus or trojan and what complementary measures to take to expose ourselves as little as possible to the risks.
Although some types of malware They can go unnoticed and many others are based on the theft of content without the user being aware of it, there are some indicators that show us that the terminal may be infected: slow running, the inability to open specific applications or the loss of some items As passwords, they can be a first indication that our tablet or smartphone has been attacked. On the other hand, there are other viruses that show their existence from the moment of the attack through the massive arrival of ads, messages that offer us supposed rewards or the sudden appearance of other contents that prevent us from using the device in a normal way.
We have a virus on our tablet, now what?
When we are certain that our models have been infected, we must act quickly. The first thing will be to turn off the terminal the device to start it in the «Safe Mode«. In the vast majority of models, it is enough to press the shutdown button in an interval of between one and two seconds and with this, all installed applications, including those that have the harmful element, are stopped running.
2. Start in Safe Mode
Once we have accessed the options of the shutdown menu of our terminal and have activated the safe mode, we touch on it. Once inside, we can access all the characteristics of the terminal and investigate more thoroughly in the Settings menu Once we have accessed this last tab, we will enter «Applications«, Where we can see the complete list of everything that is installed.
Once we are on the screen that shows us all the information related to the apps, we will begin to look for who is responsible for having been attacked. This phase is very simple since we can identify the deceased through his name or his icon. Within this menu, files that have names such as «may be suspiciousxdeghost»Or similar after the name of the application. Clicking on it, we can uninstall completely. If we continue with doubts, checking the download history, we can also find the virus.
4. Final disposal
Once we have uninstalled it and see that it does not appear in the applications menu, we will exit this and go to «Settings«, Then to«Security»And finally, to«Device manager«, Where we will see which apps have special permissions and where we can manage which ones we grant and which do not. If we find the malicious file here again, we will press «Deactivate«. To confirm that it has been completely deleted, once this is completed, we can return to the applications menu within the settings.
Finally, once the previous steps have been followed, we restart the terminal, which will cease to be in "Safe Mode" and which, in most cases, will have regained normalcy. If the problem continues, it is best to make a backup copy of what we consider most important and restore the factory settings.
In many cases, infections by Trojans and other elements, are not too important and the impact can be minimized even more if we use our tablets with common sense and remembering other tips that we offered before such as, for example, downloading only apps from Featured developers and having a good antivirus, of which we can find dozens in the application catalogs. After knowing how we can eliminate malicious objects from devices quickly and without many complications, do you think that manufacturers and developers should work harder to prevent this from falling on users? You have available more related information such as, for example, a list with several applications that will help you improve the security of your models while optimizing their resources so that you can make the most of them.