The most important protection lies in the behavior of the users. It's almost like a question of faith when it comes to virus protection for smartphones: Some say that a protection program against viruses, phishing and other rip-offs definitely belongs on a smartphone. Others think this is completely unnecessary.
What are the pros and cons of virus protection or security apps on a smartphone?
At this point we would like to apologize that the text is a bit longer. But there are many aspects and arguments on this topic.
| For that | Against it |
|---|---|
| A security app protects against malware on the smartphone. | Many security programs do not scan apps for malware, but simply check databases to see whether apps are listed as harmful. |
| With the right security app, a lost smartphone can be located, locked and the data on it deleted remotely. | The operating systems themselves already have many functions of the security apps on board. |
| Many security apps run unnoticed in the background and are therefore not annoying. | Some security apps eat up memory, battery and performance. |
| Anyone who carelessly opens third-party websites or accesses fraudulent sites via links in emails can catch pests. A good security app warns about this. | There are also warnings about suspicious behavior on websites in many browsers. |
| Antivirus apps usually include a firewall . If you often surf public Wi-Fi networks, you should always use a firewall. |
Some also say that antivirus or security apps are unnecessary for the following reasons:
- If you only install apps from the official store, you can be sure that you won't catch any viruses.
With Apple, installation from other sources is not possible at all - unless you manipulate your iPhone or iPad (so-called jailbreak). Google now uses “Play Protect” to examine every app in its Play Store before installing it on the smartphone or tablet. Users can also set the tool so that all of their installed apps (including from other sources) are scanned by “Play Protect”. And yet dangerous apps still make it from the Play Store to user devices. In a study by Stiftung Warentest at the end of 2018, Google's own protective function received a grade of "poor". Overall, “Play Protect” scored “sufficient”. - If you don't follow links in emails and only open "clean" pages on the Internet, you have little to worry about, even without a security app.
Many browsers also automatically warn you about phishing sites. In the iPhone and iPad browsers, for example, phishing warnings are activated by default. But: Heise Security provides examples of how simply accessing a website can paralyze your cell phone. - Security apps also advertise additional functions that Android, iOS and Windows Phone sometimes already offer: free location and locking of the device, for example. However, this function must first be set up. More about this in the article Locating your cell phone .
- There is also data protection : security apps usually want full access to everything that the permission range allows. It's somehow logical, because that's the only way they can function completely and, for example, delete all your data remotely if your cell phone is stolen. But this also allows the app providers to access all the information from your device. We'll go into this in more detail below.
Why Apple users are quite safe
With iOS, installations are only possible via the App Store if you have not manipulated the operating system through a jailbreak. Because Apple checks all apps before publishing them, users are quite safe.
Things look a little different with Android: around 90 percent of all smartphones in the world have this operating system.
Apps can be installed from the official Play Store, but also from other and sometimes unsafe sources. Installation files for Android have the ending .apk and can be sent, for example, by email. Developers can inject malicious apps into the Play Store, which are then subsequently removed by Google. Tip: Don't install new apps immediately, but rather wait a few weeks and read user reviews.
Important to know: Malware and Trojans always have to be installed first. So they get onto the device through “dirty” apps or manipulated websites/advertising banners and can then cause mischief. It is therefore particularly important to pay attention to important things when using your cell phone (see below).
Firewalls
Virus protection apps usually come with a firewall. However, it is also available as a separate app from various providers. Some of these require so-called root rights for Android devices (if you root your phone, you often lose the manufacturer's warranty). But there are also some without. We don't want to go into that in more detail. However, firewalls are important in public networks (e.g. hotspots) to protect packet sniffers Such software specifically looks for security gaps in the devices connected to the network. Often the users themselves don't notice anything. Regular updates (if available) and, above all, turning off the WLAN module protect against this.
Some free apps collect too much data
In its investigation, Stiftung Warentest found that many security apps send more user data to the manufacturer or even marketing companies than is necessary for operation. Just like us, the testers are critical of this – “even if it turns out to be comparatively harmless for most apps,” says the test report. “Most applications send information about the network operator with which the cell phone is registered. This is not very sensitive information, but it is not necessary for the apps to function.”
The best antivirus protection is you!
Conclusion: Many Android smartphones already have what the security apps provide on board - for example, from version 5.1 onwards an activation lock. It permanently links the device to the owner's user account. Even if it is reset to the factory settings, it cannot be put back into operation without your Google access data.
The apps on Android and iOS run in a so-called sandbox: This is an isolated area within which every action has no effect on the external environment. only happen if you allow it to affect other areas (keyword: app permissions ).
That's why it's important to know exactly what apps want to access and for what reasons. With Android version 6 (Marshmallow) or higher, you can grant and revoke individual rights in the system settings. For example, if you don't want a social network app to be able to constantly determine your location, turn off this right. If it no longer works after that, it might be worth looking for an alternative.
It also never hurts to make backup So regularly back up your smartphone's files on a PC or (if there aren't that many) a USB stick. Depending on how much you do with your device, a backup once a month might be enough. In an emergency, you can restore your files to your cell phone if you have to “completely destroy” it because of a malware.
Reset used smartphones!
If you get a used device, you should reset it to the factory settings before using it for the first time. For example, the previous owner may have installed surveillance that spies on your behavior without you noticing. It would be removed immediately during the so-called reset.
You should generally keep this in mind when using your smartphone
- Only install apps and updates from the official app stores!
- In the Android settings under “Security”, deactivate the “Unknown sources” or “Install unknown apps” item.
- Don't be fooled by emails that claim to contain an update for certain apps in the attachment. Update messages for apps from the official stores do not come via email!
- Read about what rights the apps want to have. more about app rights here .
- Protect your smartphone with a secure locking method .
- Keep your operating system version up to date as updates often include security improvements.
- Have your mobile phone provider block the use of paid SMS services (“premium services”).
Keyword: third-party blocking . Then you won't be able to mess around with it anymore.
Information from our cooperation partner Checked4you
Also read: Make your smartphone and tablet childproof
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

