How to Remove Trojan

I trojan are one of the most widespread cyber threats in the world. These are malware that, disguising itself as apparently useful programs, settle on the victim's PC, smartphone or tablet, with the aim of spying on their activities or performing other harmful operations. Precisely for this reason, today I want to explain to you how to remove trojan from PC, smartphone and tablet in the simplest way possible.

How do you say? Are you not a great expert in computer science and you fear that the operations I am about to show you may be too complicated for you? But no, you are wrong, and also grossly! Contrary to appearances and beyond what you may think, getting rid of Trojans is in fact quite simple ... clearly provided you use the right tools. But you don't have to worry about this: I'll show you some of the best.

So if you are interested in finding out how to secure your devices, I suggest you take a few minutes of free time, sit comfortably and concentrate on reading this guide. I am sure that, in the end, you will be able to tell yourself more than satisfied with the results obtained.

How to Delete Trojan from PC

The simplest solution for delete trojans from PC consists in carrying out an analysis, better if in depth, using a solution antimalware modern and updated: below I'll explain how to do both on the operating system Windows that of MacOS.


If you use a computer equipped with Windows 10 as an operating system, the first solution I invite you to consider is Windows Defender: the antimalware integrated "standard" in the Microsoft operating system and which allows you to easily find and neutralize any active threats, including trojans. Unless you have manually disabled it, Defender is generally on by default and, as a result, is able to clear malware and viruses before they are even activated.

However, if you find it appropriate to perform a manual scan of the operating system, follow these steps: search Windows security in the search bar on the taskbar and choose the first result returned. In the window that opens, click on the icon related to Virus and threat protection and use the available items to initiate the type of scan you think is most appropriate.

I advise you to make afull analysis or anoffline analysis (which is carried out following a restart of Windows, in a protected environment). Having made your choice, click on the button Start analysis and wait for the result of the search, which could last several hours, depending on the type of analysis chosen and the amount of files to be examined.

If Defender's analysis fails but, at the same time, the computer continues to show you signs related to the presence of trojans and / or other malware, I recommend that you perform a scan using an alternative antivirus solution, which could to be Bitdefender, Avira o AVG: I told you about it in detail in my tutorial dedicated to the best free antivirus.


The situation, with regard to the Poppy, is very different from that which characterizes Windows PCs. Trojans and, in general, malware dedicated to the operating system MacOS in fact, they are not very common, since Apple's operating system is relatively little used (and, consequently, less considered by the bad guys) and equipped with very efficient integrated security solutions.

If, however, you feel you should still scan your Mac for Trojans, you can perform an on-demand scan using Malwarebytes: a software, also available for Windows, capable of automatically detecting and neutralizing computer threats on the computer.

To get it, connected to its official website, click on the button Free download and wait for the program installer, in pkg, is downloaded to your computer. When the download is complete, launch the file obtained and click on the button Continue three consecutive times, then on Accept e Install. When prompted, enter the password Mac in the text field and press the buttons Install software, Close e Move, to complete the setup.

Now, start Malwarebytes using the icon available in the Launchpadclick on your button Start now, presses the button Select matching to the riquadro Personal computer and choose if use Malwarebytes free (more than enough for the purposes of this guide), or if request a 14-day free trial period of Malwarebytes Premium. The latter, in particular, is the paid version of the program which, in addition to the on-demand scanning functionality, allows you to obtain resident protection and to automatically perform periodic scans.

If you have opted for the free version of the software, click on the button now Apri Malwarebytes Free and grant the necessary permissions to the antivirus, acting from the System Preferences. Then click on the button Open Preferences, then on padlock at the bottom left of the window that opened and, when prompted, enter the password of the Mac; now, select the item Full disk access from the left sidebar and put the check mark next to the entry for Malwarebytes protection.

Once this is done, close the screen Security and Privacyby clicking on (X) at the top left, go back to the Malwarebytes welcome screen and click on the button forward three consecutive times. The game is practically done: to start the analysis of the Mac, click on the button Scan and wait for the entire computer memory to be scanned for Trojans and other types of malware.

At the end of this operation - which could take a few hours -, you will be shown a summary window indicating the outcome of the analysis and any actions taken to eradicate active threats. To learn more about how to clean up your Mac from viruses, take a look at the tutorial I have dedicated to the topic.

How to Delete Trojan Android

The devices Android, due to the very wide diffusion of this operating system and its high degree of "openness", they are unfortunately subject to the risk of malware.

The official protection tool Android è Play Protect: an antivirus system integrated in the Play Store, which allows you to analyze in real time the apps that are installed on your device (even from external sources or already installed), looking for trojans and malware of various types.

Although this system is not exactly foolproof (some developers have managed to evade the automatic checks of the service, even if the respective apps were still identified and deleted later), I still recommend that you verify that it is active, so that you always have a basic security tool is available.

To make sure, open the Play Store, by touching its icon on the home screen or in the drawer, then touch the ☰ button at the top left, select the item Play Protect from the on-screen menu and touch thegear located at the top right. Finally, check that the levers indicating the words Analyze apps with Play Protect e Improve detection of malicious apps are active.

If, despite the activation of Play Protect, you suspect that a trojan is active on your smartphone or you have a device without Google services (e.g. a Huawei device with HMS), you can perform an anti-malware scan using a third-party solution, which could be Avast Mobile Security, which offers real-time monitoring for all apps installed on the device and allows you to block suspicious ones.

To be able to use it, download its app from the Play Store or an alternative store, tap the button To start and choose whether to use the basic version of the app (which is free) or upgrade to the Premium, which enables advanced features and has prices starting at € 1,99 / month.

Anyway, once you are at the main application screen, tap the button Scan and wait for Avast to scan your device memory for malicious apps and files. This could take several minutes.

I warn you that Avast is able to detect and fix some system settings that could be dangerous as well, like the permission to install the app from unknown sources. Also keep in mind that leaving the Avast Mobile Security app installed on your device will start an automatic scan every time you try to install new apps, in order to block any unwanted elements in time, even before they are activated.

If you want to know more about what are currently the best antivirus for Android in circulation, I invite you to carefully read the in-depth study I have dedicated to this topic.

How to Delete Trojans from IPhone

The malware danger on iPhone it is almost nil, unless you have jailbroken and / or are in the habit of installing apps from outside the App Store. In any case, there are common sense rules to follow to check and avoid the presence of any malicious software on iOS (and iPadOS, since the same indications also apply to iPad).

The first recommendation I want to make you, in this regard, is that of do not install antivirus for iPhone! As just mentioned, in fact, there are no widespread malware for Apple's mobile devices and, therefore, it is not necessary to install antimalware on them: the apps that promise to do so are little more than fake.

For the rest, here are some tips on how to get rid of trojan iPhone and how to avoid running into potential threats in the future.

  • Search for and remove suspicious and / or downloaded apps from outside the App Store: go to the menu Settings> General> iPhone Space and review the list of applications installed on the device. If you find any suspicious ones, that you have never used or that you did not remember installing, tap on their name and then on Delete app. More info here.
  • Remove VPN profiles suspects- Some Trojans can exploit VPN configuration profiles to perform illegal activities. To take a look at the active profiles, go to the menu Settings> General> VPN of iOS and delete the ones you didn't install yourself. If you are unable to eliminate them in this way, you can try to remedy the problem by going to Settings> General> Reset and selecting the voice Reset Network Settings. Following this operation, all network settings will be restored to the factory state and the VPNs will be deleted (however, you will also have to re-enter the passwords of known Wi-Fi networks).
  • Remove custom profiles: are those used by apps not taken from the App Store to work. You can check its presence in the menu General> Device Management of iOS (if not present, it means that there are no profiles of this type on the device).
  • Remove the jailbreak: Performing the iOS unlocking procedure can expose the operating system to security risks, which include the action of trojans and other malware of various types. For this reason, I recommend that you remove it as soon as possible. To be able to do this, you have to put the iPhone in DFU and, after connecting it to the PC via Lightning cable, reset it via iTunes, its Windows, or through the Finder of macOS. I advise you to make a backup of the data of the "iPhone by" in advance, as this procedure involves the total loss of the same. To find out more, I invite you to read my tutorial on how to remove the jailbreak.
  • Restore iPhone: if you have not carried out the unlocking procedure but your smartphone continues to behave strangely, I suggest you make a backup of the same and, subsequently, return it to the factory state, by going to the menu Settings> General> Reset> Start use content and settings of iOS. More info here.

To find out more, I recommend that you read my guide carefully in which it clearly explains how to eliminate viruses from iPhone, in which I have treated the subject in great detail.