FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ McAfee Blogs

5 Signs Your Device May be Infected with Malware or a Virus

By: Toni Birdsong — November 6th 2025 at 00:19

The malware landscape is growing more complex and costly by the minute, as indicated by the rising number of cyberattacks that grow each year. According to the Federal Bureau of Investigation, in 2024, approximately $1.4 million in losses were reported due to malware. Meanwhile, complaints of ransomware, a type of malware that locks your files until a ransom is paid to release them, rose by 9% from the year prior, with losses totaling nearly $12.5 million. 

With the continued growth of e-commerce, online banking, and artificial intelligence, we can count on even more new cyber threats for all kinds of devices—be it Android, iPhone, PC, or Mac. No device under your family’s roof is immune to cyberattacks. As we speak, one or more of your devices may have already been infected. But would you know it?

In this blog, we’ll dive into the types of viruses and malware that infiltrate devices and their indications, the ways you can remove them, and tips to protect your phones moving forward.

What is malware? 

Malware is malicious software designed to harm your device, steal your personal information, or disrupt your digital life. On mobile devices, malware can take many forms—from apps that secretly collect your data to programs that bombard you with unwanted ads or even lock your device for ransom.

No mobile device is impervious to cyber threats

Mobile devices, including smartphones and tablets, can be infected with malware and other digital threats, even when their operating systems have built-in security features. How does this happen? Your phone can catch viruses and malware in several ways:

  • Malicious apps from unofficial sources. This is the most common way your device could be infected by malware or viruses. Downloading unofficial apps from unvetted third-party websites or app stores significantly increases your device’s risk of being infected with malware that steals your personal information or damages your device.
  • Phishing links. Cybercriminals send deceptive text messages, emails, or social media direct messages that have malicious links. When you tap on these links, they can automatically download malware to your device or redirect you to fake websites that capture your login credentials.
  • Drive-by downloads. This happens when you visit compromised websites that automatically install malware onto your device without your consent or knowledge. Similarly, malicious advertisements on legitimate websites can contain embedded code that infects your device even when just viewed. 
  • Unsecured Wi-Fi networks. Through public Wi-Fi, cybercriminals can create fake networks, monitor traffic on legitimate ones, intercept data, or push malicious content to your device.
  • Outdated operating systems and apps. When you delay or disregard system or software updates, you weaken your security and leave it vulnerable to hackers. Enable automatic updates whenever possible, and regularly check for system and app updates manually, as these include security patches.

Signs of malware or a virus

Malware doesn’t always announce itself with a big flashing sign. On the contrary, it slips quietly into your devices and starts causing trouble behind the scenes. Before long, you will see noticeable changes in its behavior. Here are five key signs of malware or a virus to watch for and catch the problem early, before the damage spreads:

  1. Your device is hot to the touch. When you accidentally download malware, your device’s internal components work harder to support the malware or virus that has been embedded. This may cause your device to feel hot to the touch or even overheat.
  2. Everything feels off. A digital virus can impact every area of a device’s performance, such as causing websites to load more slowly, apps to crash, or your battery to drain more quickly. Overall performance will be sluggish no matter how many times you reboot or delete large files.
  3. More random pop-ups and unfamiliar apps. You may notice an increase in random pop-ups. And if you take a closer look at your app library, you may even see apps you never downloaded.
  4. Fraudulent links sent from your accounts. It’s common for malware to gain access to your phone and then send messages to your contacts to spread the malware. This can happen via email, text, and even social media accounts. You could even see unexpected charges in your phone bill for premium services.
  5. You have unauthorized charges. If you notice unauthorized charges on your credit card or bank statement, a malicious app or malware may have accessed your personal information to make fraudulent purchases or subscriptions. 
  6. Browser redirects or changed search settings. Your web searches redirect to unfamiliar sites, or your default search engine changes without your input. Search malware may have hijacked your browser to generate ad revenue or expose you to harmful websites that can compromise your browsing privacy.
  7. Unknown accessibility services running. Your phone’s accessibility settings show services you didn’t enable. These could have generic names or be disguised as system apps to monitor your activity, capture passwords, and control your device.
  8. Excessive data usage spikes. A dramatic increase in your monthly data consumption while your device usage habits are the same often indicates malware is transmitting your personal information, downloading additional malicious content, or participating in botnet activities using your cellular data.

Viruses and malware that infect mobile devices 

As our phones and tablets become extensions of our daily lives, cybercriminals have developed sophisticated malware explicitly designed to infiltrate them, such as:

  • Adware. This is unwanted software that displays intrusive pop-up ads on your device, invading your privacy by tracking your browsing habits and significantly slowing down your device.
  • Spyware and Stalkerware. These types of malware secretly monitor your activities, including messages, calls, and location data, risking your personal safety and privacy and potentially enabling harassment or abuse.
  • Banking Trojans. These target your financial information by mimicking legitimate banking apps or intercepting login credentials, then access your bank accounts, steal your money, or make payments using your accounts.
  • Ransomware. Here, the malware encrypts and locks your personal files, then demands payment before restoring your access to your own data. Whether or not you pay, you could lose important photos, documents, and files.
  • SMS Trojans. These apps send premium-rate text messages or make unauthorized calls without your knowledge, racking up unexpected charges on your phone bill that can accumulate quickly. 
  • Fleeceware. These apps appear legitimate but charge excessive subscription fees after a short trial period, often making cancellation difficult. The frustrating thing is that you face ongoing financial charges for apps that provide no value.
  • Rogue configuration profiles. Unauthorized settings will be installed on your device, enabling cybercriminals to gain access and monitor your activities.

Find the proof of a virus or malware

Sometimes the warning signs are obvious, but at other times, malware operates quietly in the background, stealing data or draining resources without drawing attention. Find out for sure if your device has a virus or malware by following these steps:

  1. Check battery usage statistics. To check this on Android, navigate to Settings > Battery to see which apps are consuming the most power. On iPhone, check Settings > Battery > Battery Usage by App. Look for unfamiliar apps that use excessive power or apps you rarely use that appear at the top of the list.
  2. Inspect your data usage. Review your data consumption on Android by going to Settings > Network & Internet > Data Usage. For iPhone, head to Settings > Cellular. Look for apps that use more data than expected or unfamiliar apps that consume significant amounts.
  3. Look for apps you didn’t download. Review your app list regularly for unfamiliar applications by going to Android’s Settings > Apps, or check your app drawer. On iPhone, swipe through your home screens and check your App Library. Remove apps you didn’t install, especially those with generic names or no clear purpose.
  4. Review app permissions. Malware sometimes modifies app permissions to access your personal information. On Android, go to Settings > Privacy > Permission Manager to seeAdmin Apps to view which apps have access to your camera, microphone, location, and contacts. On iPhone, check Settings > Privacy & Security. Revoke permissions for apps that don’t need them.
  5. Look deeper into security warnings. Both Android and iOS will alert you to potential security threats. Don’t ignore notifications about potentially harmful apps, suspicious activity, or unknown device logins. Take these alerts seriously and investigate immediately.
  6. Run comprehensive scans with reputable security tools. Use trusted antivirus software to perform full system scans on your mobile devices. Many device manufacturers also provide built-in security scanning features, such as Windows Defender on PCs or Google Play Protect on Android devices.
  7. Review account security alerts and login activity. Major platforms provide account activity logs showing recent logins and locations. Check your email, social media, and banking accounts for alerts about suspicious login attempts or password changes you didn’t initiate.

Here are more specific measures to ascertain the presence of a virus or malware, based on your mobile device’s operating system:

Android phones and tablets

  1. Test your device in Safe Mode. Restart your Android device. As it boots up, tap and hold “Power off” until you see “Reboot to safe mode.” In this mode, only pre-installed apps will run. If your device performs normally here but has issues in regular mode, a downloaded app is likely the culprit.
  2. Review device admin and accessibility services. Go to Settings > Security > Device admin apps to see which apps have administrative privileges. Remove any unfamiliar apps immediately. Also, check Settings > Accessibility for services you haven’t enabled and prevent malware from controlling your device.
  3. Run a Google Play Protect scan. Open Google Play Store, tap your profile picture, then select “Play Protect.” Tap the gear icon and ensure that “Scan apps with Play Protect” is enabled. Then, run a manual scan to check for harmful apps.

iPhone or iPad

  1. Check for unexpected configuration profiles. Go to Settings > General > VPN & Device Management (or Profiles & Device Management). If you see vaguely named profiles that you didn’t install, they could be the culprit. Legitimate profiles from your workplace, school, and services will have clear, recognizable names.
  2. Look for unknown enterprise certificates. Navigate to Settings > General > About > Certificate Trust Settings. Any certificates you don’t recognize, particularly those enabled for full trust, warrant investigation.
  3. Review installed apps and web clips. Check your home screen and App Library for applications you didn’t download. Also, examine Settings > Screen Time > See All Activity to identify apps that consume unusual amounts of time or data. Web clips—website shortcuts that mimic apps—from unknown sources could indicate a compromise.
  4. Examine Safari settings changes. Open Settings > Safari and verify your search engine hasn’t been changed. Also, under Settings > Safari > Extensions, check if new content blockers or extensions have been installed. Unexpected changes to your default search engine or new extensions could redirect your browsing activity and compromise your privacy.
  5. Watch for account compromise indicators. Be alert for unexpected password reset emails, new device logins, or changes to your Apple ID settings that you didn’t make. Check Settings > [Your Name] > Sign-In & Security for any unrecognized devices or suspicious activity.

Action plan to remove viruses from your mobile device 

If you discover malicious apps and profiles in your phone, a clear, step-by-step action plan will help you remove them and restore your device to a secure state. Here’s how to tackle mobile malware confidently and get your device back to normal:

  1. Isolate your device immediately. Turn on airplane mode to stop malware from communicating with external servers while you clean your phone. You can still access your device’s settings and installed apps in airplane mode.
  2. Remove suspicious apps and configuration profiles. On Android, go to Settings > Apps and look for unfamiliar applications, especially those requesting excessive permissions. On iPhone, check Settings > General > VPN & Device Management for unknown configuration profiles. Uninstall any apps you didn’t download from official stores and remove suspicious profiles immediately. Pay attention to apps that appeared recently or have names similar to legitimate apps.
  3. Clear your cache. Open your browser settings and clear all browsing data, including history, cookies, cached files, and saved passwords to remove potentially malicious scripts and tracking elements. On Android Chrome, go to Settings > Privacy and Security > Clear browsing data. On iPhone Safari, go to Settings > Safari > Clear History and Website Data
  4. Revoke risky app permissions. Revoke unnecessary permissions for all apps, especially those that access your camera, microphone, location, or contacts. On Android, go to Settings > Apps > App Permissions. On iPhone, check Settings > Privacy & Security. Take note, particularly for recently installed or suspicious applications.
  5. Update your operating system and all apps. Install all available system updates through Settings > System Update (Android) or Settings > General > Software Update (iPhone). Download apps only through the Google Play Store or Apple App Store.
  6. Run a comprehensive security scan. Use a reputable mobile security app to scan your device thoroughly for malware, potentially unwanted programs, and security vulnerabilities. To know if you have McAfee on your phone, search “McAfee” in your device settings.
  7. Restore from a clean backup if necessary. If the infection persists or causes significant damage, consider restoring your device from a backup that was created before the infection occurred. Both Android and iPhone offer cloud backup services via Google Drive/iCloud that let you restore your data while starting fresh. Ensure the backup version isn’t infected by checking when symptoms first appeared versus when the backup was created.
  8. Escalate to professionals if issues persist. Contact cybersecurity professionals or your device manufacturer if your browser continues to redirect to suspicious websites or if you see evidence of credential or financial theft.

Best digital habits to safeguard your family devices

With a few smart habits and simple tools, you can create a safer digital environment for your family members. Here are some practical ways to safeguard family devices and keep threats at bay.

  • Stay on top of updates. Aside from installing comprehensive security software, be sure to update your device’s security features to have the latest protection from specific attacks.
  • Use strong, unique passwords. Every family device should have a strong password and a unique username. This means changing your factory settings immediately and getting your family on a schedule to change passwords.
  • Enable two-factor authentication (2FA). Double the security to your important accounts by requiring a second form of verification. 2FA significantly reduces the likelihood of unauthorized access, even if your password is stolen.
  • Know your apps. Avoid third-party apps and download apps only from trusted sources. Research the app’s safeguards and read reviews before installing. A best practice is to stick to apps from the officially verified app stores.
  • Don’t click that link. Slow down and note your digital surroundings. Does that link or attachment look dubious? Malware and viruses are usually loaded onto your devices through unsolicited emails and text messages, or via trusted social media circles.
  • Lock settings and limit app permissions. A great way to block malware is to make all accounts private and limit app permissions. Instead of keeping an app’s permissions “always-on,” change the setting so it asks permission every time. Decline an app’s request to access your contacts or connect to other apps in your digital ecosystem.
  • Clear browsing history. Go through your history and data to check for suspicious links. Clear browsing history regularly by going to your browser, clicking on the three dots in the upper right corner, and clicking “delete browsing data.”
  • Avoid public Wi-Fi or use a secure VPN. Public networks are often unsecured and can expose your data to cybercriminals. If you must connect while in public, consider using a virtual private network or your mobile data hotspot instead.

Final thoughts

While the threat of malware and viruses continues to evolve, you now have the knowledge and tools to stay digitally protected. The signs we’ve discussed—from unexpected device behavior to suspicious pop-ups—serve as warnings, helping you catch problems before they escalate into major security incidents.

Your best defense combines proactive security measures and vigilant behavior. Applying simple, solid digital habits such as updating software, using strong passwords, and staying alert to suspicious activity will thwart the vast majority of common threats. By incorporating these practices into your routine, along with the right online security tools, you are building a robust defense that works around the clock.

The post 5 Signs Your Device May be Infected with Malware or a Virus appeared first on McAfee Blog.

☐ ☆ ✇ McAfee Blogs

Could Your Social Media History Come Back to Bite You?

By: Toni Birdsong — September 18th 2024 at 11:00
Getting caught in a social media faux pas seems to be the new normal. It’s not uncommon for old social media posts from celebrities, influencers, and politicians to resurface and spark public outcry. They find themselves under fire for past comments or behaviors that, viewed through today’s lens, were deemed offensive or inappropriate.

In our fast-moving digital world, today’s conversations can take on new meanings years down the line. Then you might find yourself explaining posts that no longer reflect who you are.

This reality makes it crucial to start a conversation in your family about social media archives. Teens and tweens are constantly posting, snapping, tweeting, and commenting every day. According to the latest research, 97% of teens go online daily, with many saying they are “almost constantly” connected.

With so much activity, it’s just a matter of time before some questionable content resurfaces, potentially compromising a job, scholarship, or personal relationship. Old social posts don’t just haunt celebrities; in today’s digital culture, everyone’s online activity is open to scrutiny.

Eight tips for smarter posting

1. Vet your content. Ask yourself some key questions: Is there anything in this post or comment that could hurt me in the future? Does this post defame a specific race, religion, or lifestyle? Is this content contributing to the conversation or just noise?

2. Be Careful with Humor: Not everyone shares your sense of humor. What seems funny today could be viewed differently in the future. Just look at how comedians and public figures are often held accountable for jokes or comments made years ago.

3. Don’t pick at it—purge it. No doubt, people change. You may not be the 20-something hothead who began tweeting or blogging nearly a decade ago, but your archives are still out and say otherwise. In her book, The Life-Changing Magic of Tidying Up, Japanese cleaning consultant Marie Kondo takes tidying to a whole new level, some of which we can apply here.  1) Don’t analyze everything and just pair down — purge. 2) Get rid of anything that doesn’t spark joy for you 3) Don’t ask yourself what you like about a photo or post, ask yourself  ‘Why should this stay?’ 4) Keep only the content that makes you happy or inspires you. Chop everything else.

4. Use X’s advanced search. Some of us have tweeted out several novels worth of content. Who has time to go through that? Twitter has advanced search features that will help you quickly find questionable tweets. Just go to https://twitter.com/search-advanced and enter keywords and phrases, along with your user account name. This search will help isolate tweets that could be compromising.

5. Am I being true to who I am? Most tweens and teens are not asking themselves this question, but we can still encourage our kids to engage in this specific self-reflection. Encourage young publishers to think about what message and image they hope to project to go through their archives with that in mind. Encourage them to review everything about their profiles from their bio to the kinds of movies and books they’ve called out, to their Facebook groups. Ask: Is this still who you are? Are these still the interests you’d like to project?

6. Delete immediately:

  • Inactive social media accounts
  • Provocative or inappropriate photographs, videos, or posts
  • Posts or photos that include drinking or using drugs
  • Discriminatory comments related to race, religion, gender, etc.
  • Content that complains about a previous employer or colleague
  • Posts that are overly cynical, grumpy, or mean

7. Review likes and post privacy settings. Even the posts of others (that are marked public) that you like or comment on will show up on Google, which means others could judge you guilty by association. It may be time-consuming, but you can clean up your Facebook ‘like’ history in the Activity Log. If you want to share but still limit who can view your posts, McAfee’s Social Privacy Manager helps you adjust your social media privacy settings based on how public or private you want to be online.

8. Google yourself. See what comes up. Be sure to check images, videos, news, and more tabs. You just never know what content will make it into remote circles. If you find something surprising, contact the site host and request they remove the content.

The post Could Your Social Media History Come Back to Bite You? appeared first on McAfee Blog.

☐ ☆ ✇ McAfee Blogs

How to Get Kids Focused on Their Online Privacy

By: Toni Birdsong — June 20th 2024 at 11:15

Kids engage online far differently than adults. Between group chats, social apps, and keeping up with digital trends, their interests, and attention spans constantly shift, which means online privacy concerns get sidelined. Here are a few ways to move online privacy center stage.

Helpful Tips to Help Kids Protect Their Privacy

1. Make Privacy Fun and Relatable

Few things will put kids to sleep faster than talking with parents about online stuff like privacy. So, flip the script. Talk about the things they love online—shopping, TikTok, and group chats. Why? Because all that daily fun could come to a screeching halt should a bad actor get a hold of your child’s data. Establishing strong digital habits allows your child to protect what they enjoy including their Venmo account, video games, and midnight chatting. Doing simple things such as maximizing privacy settings on social networks, limiting their social circles to known friends, and refraining from oversharing, can dramatically improve digital privacy.

2. Strong Relationship = Online Safety

We say it often: The best way to keep your kids safe online is by nurturing a strong relationship with them. A healthy parent-child connection is at the heart of raising kids who can make good choices online. Connect with your child daily. Talk about what’s important to them. Listen. Ask them to show you their favorite apps. Soon, you’ll discover details about their online life and gain the trust you need to discuss difficult topics down the road.

3. Layer Up Your Protection

According to the latest Data Breach Investigations Report (DBIR), which examined the state of cybersecurity in 2023, some 68% of global breaches, regardless of whether they included a third party or not, involved a non-malicious human action, such as a person making an error or becoming a victim of a social engineering attack. For that reason, consider putting an extra layer of protection between your family and cyberspace. A few ways to do that:

4. Build Your Digital Offense

A good digital offense is the best way to guard yourself and your family against those out to misuse your data. Offensive tactics and habits include using strong passwords, maximizing privacy settings on social networks, using a VPN, and boosting security on the many IoT devices throughout your home.

5. Deep Clean Your Digital House

Get in the habit of deep cleaning your technology and bring your kids into the routine. Here’s how:

  • Together, remove unused apps from all devices
  • Add Multi-Factor Authentication to your account passwords
  • Update all device software
  • Wipe social profiles (including posts) clean of personal or family information such as full names, school names, birthdates, ages, addresses, phone numbers, emails, or location patterns. Do it together and even throw in a few rewards.

Level Up Family Cybersecurity

It’s hard to slow down and get serious about online privacy if you’ve never experienced a breach or online theft of some kind. However, chances are, the dark side of online living will impact your family before long. Ready to go deeper? Dig into these cybersecurity tips for every age and stage.

The post How to Get Kids Focused on Their Online Privacy appeared first on McAfee Blog.

❌