Android devices in particular are increasingly becoming the target of criminals. The most important protection lies in the behavior of the users.
As our cooperation partner checked4you reports, it's almost like a question of faith: Some say that a protection program against viruses , phishing and other rip-offs definitely needs to be on your smartphone. Others think this is completely unnecessary.
What are the pros and cons of security apps?

Some also say that security apps are unnecessary for the following reasons:
- If you only install apps from the official store, you can be sure that you won't catch any viruses. With Apple, installation from other sources is not possible at all - unless you manipulate your iPhone or iPad (so-called jailbreak). Google now uses “Play Protect” to examine every app in its Play Store before installing it on the smartphone or tablet. Users can also set the tool so that all of their installed apps (including from other sources) are scanned by “Play Protect”.
- If you don't follow links in emails and only open "clean" pages on the Internet, you don't have to worry about anything, even without a security app. Many browsers also automatically warn you about phishing sites. In the iPhone and iPad browsers, for example, phishing warnings are activated by default. Heise Security provides examples of how simply accessing a website can paralyze your cell phone.
- Security apps also advertise additional functions that Android, iOS and Windows Phone sometimes also offer: free location and locking of the device, for example. However, this function must first be set up. More about this in the article Locating your cell phone .
- There is also data protection: Security apps usually want full access to everything that the permission range allows. It's somehow logical, because that's the only way they can function completely and, for example, delete all your data remotely if your cell phone is stolen. But by doing this you also allow the app manufacturers to access all the information from your device. We'll go into this in more detail below.
Why Apple users are quite safe
With iOS, installations are only possible via the App Store if you have not manipulated the operating system through a jailbreak. Because Apple checks all apps before publishing them, users are quite safe.
Things look a little different with Android: around 90 percent of all smartphones have this operating system. Apps can be installed from the official Play Store, but also from other (unsafe) sources. Developers can inject malicious apps into the Play Store, which are then subsequently removed by Google. We cannot say whether “Play Protect” offers absolute protection in this regard. Tip: Don't install new apps immediately, but rather wait a few weeks and read user reviews.
The fact is: Malware and Trojans always have to be installed first. They get onto the device through “dirty” apps (files with the extension .APK) or manipulated websites/advertising banners and can then cause mischief. It is therefore particularly important to pay attention to important things when using your cell phone (see below).
Firewalls
Virus protection apps usually come with a firewall. However, it is also available as a separate app from various providers. Some of them require so-called root rights on Android devices. But there are also some without. We don't want to go into that in more detail. However, firewalls are important in public networks (e.g. hotspots) to protect against so-called packet sniffers. Such software specifically looks for security gaps in the devices connected to the network. Often the users themselves don't notice anything. Regular updates (if available) and, above all, turning off the WLAN module protect against this.
Some free apps collect personal data
In its 2016 study, Stiftung Warentest found that, unlike in 2013, many free security apps do not provide reliable protection. Worse still, some even send personal user data to other companies. When it came to data protection, the testers gave it a “very critical” rating.
The best antivirus protection is you!
Conclusion: Many Android smartphones already have what the security apps provide on board - for example, from version 5.1 onwards an activation lock. It permanently links the device to the owner's user account. Even if it is reset to factory settings, it cannot be put back into operation without your access data. The apps on Android and iOS run in a so-called sandbox: This is an isolated area within which every action has no effect on the external environment. only happen if you allow it to affect other areas (keyword: app permissions ). That's why it's important to know exactly what apps want to access and for what reasons. With Android version 6 (Marshmallow) or higher, you can grant and revoke individual rights in the system settings. For example, if you don't want a social network app to be able to constantly determine your location, turn off this right. If it no longer works after that, it might be worth looking for an alternative.
Reset used smartphones!
If you get a used device, you should reset it to the factory settings before using it for the first time. For example, the previous owner could have installed a Trojan that spies on your behavior without you noticing. This would be removed immediately during a so-called reset.
What do Trojans do?
The term “Trojan” comes from a legend in which the Greeks hid in a large wooden horse during the war for the city of Troy. The Trojans think it is a gift from the gods and make it to their city. Once inside, the Greeks can then ravage and conquer the city. Digital Trojans behave accordingly - they sneak onto the PC or smartphone and can then access, for example, address data, passwords or online banking data. Expensive premium SMS messages can also be sent automatically, which then leads to increased costs on your cell phone bill.
You should generally keep this in mind when using your smartphone
- Only obtain apps and updates from the official app stores!
- In the Android settings under “Security” deactivate the “Unknown sources” item, i.e. do not check the box or set the slider to “Off”.
- Don't be fooled by emails that claim to contain an update for certain apps in the attachment. Update messages usually do not come via email!
- Read about what rights the apps want to have. more about app rights here .
- your smartphone with a secure locking method .
- Keep the operating system version up to date, as updates often contain security improvements.
- You can have your mobile phone provider block the use of paid SMS services (“premium services”). Keyword: third-party blocking . Then you won't be able to mess around with it anymore.
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

