If you think someone installed spyware on your phone, the right response is to secure the device, review suspicious apps and settings, and remove anything you do not trust. This guide focuses on legal self-protection: how to remove a spy app from your own phone, how to spot warning signs, and when a factory reset is the safer option.
Updated March 2026
How to Remove a Spy App on Your Phone
- Review recently installed apps and delete anything suspicious.
- Check device-admin, accessibility, VPN, and profile settings for unknown control tools.
- Restart in safe mode if the app resists removal.
- Update the operating system after cleanup.
- Change passwords for your email, Apple ID, Google account, and banking apps.
Warning Signs of a Spy App
- Battery drain with no clear cause.
- Unusual data usage.
- Overheating when the phone is idle.
- New device-admin or accessibility permissions you did not set.
- Random reboots, pop-ups, or app crashes.
Manual Removal Steps
On Android, check installed apps, device-admin settings, accessibility services, and VPN or certificate profiles. On iPhone, review device-management profiles, unknown VPNs, and suspicious app permissions. If you are unsure which app is responsible, take screenshots before deleting anything so you have a record.
When to Factory Reset
If the device keeps acting compromised, if a spyware app returns after removal, or if you suspect deep tampering, back up only clean essentials and perform a factory reset. After the reset, do not restore from an untrusted backup without review.
What to Do After Removing Spyware
- Change important passwords.
- Enable two-factor authentication.
- Review account logins and trusted devices.
- Check your email and cloud accounts for takeover signs.
For related protection steps, read how to check if your data has been breached, our personal cybersecurity checklist, and our account recovery guide.
Frequently Asked Questions
Can antivirus remove a spy app?
Sometimes, but not always. Manual review is still important, especially for device-admin settings, hidden profiles, and permissions abuse.
Can an iPhone have a spy app?
It is less common than on Android, but risky profiles, cloud compromise, and abusive configuration changes can still create monitoring problems.
Related Security Guides
Next, read how to check if your data has been breached, our personal cybersecurity checklist, and our account recovery guide.
Leave a Reply