Your smartphone is no longer just a phone. It’s your bank card, your ID, your diary, your work device and your gateway to the internet. And that makes it incredibly valuable – not just to you, but to criminals.
Online fraud is big business, and scammers are more sophisticated than ever. Mobile fraud isn’t about obvious viruses or suspicious emails riddled with spelling mistakes. It’s subtle, sophisticated and often invisible until the damage is already done. A single download, tap or login can be enough to expose your data, drain your bank account or hand over control of your device.
Whether it’s fake apps, dodgy attachments or phishing websites, the risks to your phone privacy and finances are very real. This guide is designed to help you understand what to avoid, what to delete and how to protect yourself.
- The State of Play: Mobile Fraud in the UK
- Why Staying Vigilant Against Dangerous Apps and Websites Matters
- What Makes an App or Website Dangerous?
- The 7 Most Dangerous App Categories to Delete
- The 5 Most Dangerous Website Types to Avoid in 2025
- How Do Dangerous Apps and Websites Collect Your Data?
- How to Stay Safe: Practical Steps to Protect Your Phone
- What to Do If You’ve Installed a Dangerous App
- Upgrade Your Phone, Not Your Risk with 4gadgets
The State of Play: Mobile Fraud in the UK
Scammers aren’t just lurking in your spam folder anymore; they’re running a billion-pound criminal enterprise. Criminals have shifted focus from desktops to smartphones, where security awareness is often lower and trust is higher.
In 2024 alone, fraudsters stole £1.17 billion from unsuspecting victims in the UK. If that wasn’t bad enough, identify fraud is skyrocketing. Over 217,000 cases were reported in the first half of 2025.
The Two Types of Fraud You Need to Understand
1. Authorised Push Payment (APP) fraud
- You’re tricked into sending money yourself
- Often starts with fake shopping sites, delivery texts or ‘urgent’ bank messages
- 76% of APP fraud originates online
Example: You think you’re paying for concert tickets, but surprise – it was all just a big scam.
2. Unauthorised fraud
- Criminals access your accounts without permission
- Usually follows data theft from malicious apps or phishing sites
Example: A hacker gets into your PayPal and decides to go on a shopping spree.
But How Does This Happen?
It’s quite simple really, scammers know we’re online all the time. With the average Brit glued to their phone for nearly four hours a day, there’s plenty of time to stumble onto a dodgy website or download a risky app without realising. That abundant usage creates opportunity as smartphones:
- Store saved passwords
- Enable one-tap payments
- Sync emails, banking apps and cloud storage
- Grant apps deep system-level permissions
Once a malicious app is installed, the phone itself becomes the attack surface.
Why Staying Vigilant Against Dangerous Apps and Websites Matters
Smartphones have become deeply intertwined in our daily lives, serving as alternatives to physical payment cards, for managing finances, paying bills, signing documents and more.
With this level of reliance, smartphone users must be vigilant. It’s too easy to stumble onto a too-good-to-be-true app or sign up for a website that seems legitimate but is designed to steal your data.
So, how do you avoid them? Knowledge is power! Let’s walk you through everything you need to know to keep your wits about you when it comes to dodgy websites and dangerous apps.
What Makes an App or Website Dangerous?
With over 34 billion app downloads in the first three months of 2024 alone, hackers don’t need to trick you into clicking dodgy links anymore, they just need you to download the wrong app.
Dangerous apps and websites usually share at least one of these traits:
- Excessive permissions
- Poor transparency about data use
- Impersonation of trusted brands
- Pressure tactics (e.g. ‘act now,’ ‘last change’ or ‘account suspended’)
They rarely announce themselves. They blend into app stores, trends and everyday habits, relying on trust, convenience and distraction.
The 7 Most Dangerous App Categories to Delete


Not all dangerous apps look suspicious. Many appear helpful, entertaining or completely harmless on the surface, which is exactly why they work. Below are the 7 app categories most linked to data theft, financial loss and account compromise. If you have apps that fall into any of these groups, it’s worth reviewing (or deleting) them immediately.
1. Imposter Apps & OAuth Account Hijackers
Risk level: Very High
Primary threat: Account takeover and identity fraud
Who’s most at risk: Users who reuse logins across services
Some of the most dangerous apps don’t steal data directly; they trick users into handing it over. Imposter apps mimic legitimate services such as banks, delivery companies or social platforms. Others misuse OAuth login options like ‘Sign in with Google’ or ‘Sign in with Facebook’ to retain long-term access to accounts. If abused, OAuth access can persist even after the app is deleted.
Common red flags:
- Slightly altered app names or logos
- Requests to ‘sign in to continue’ immediately
- Lack of clarity about connected account permissions
2. ‘Free’ VPN Apps That Sell Your Data
Risk level: High
Primary threat: Data harvesting and resale
Who’s most at risk: Users relying on free privacy tools
Free VPNs promise anonymity and privacy, but many operate on a simple trade-off: you get ‘free’ protection, and they get your data.
Some free VPN apps log browsing activity, track device identifiers and sell user data to third parties. Others route traffic through insecure servers, exposing users to even greater risk than if they hadn’t used a VPN at all.
If you are not paying for the product, you are often the product.
Common red flags
- No clear business model or company information
- Excessive permissions beyond network access
- Vague or missing privacy policies
3. Flashlight & Utility Apps with Malware
Risk level: High
Primary threat: Malware delivery and data collection
Who’s most at risk: Users downloading ‘quick fix’ tools
Apps designed to perform simple functions, like flashlights, calculators or QR scanners, should not require deep system access. When they do, it’s often a warning sign.
Many malicious utility apps act as malware carriers, requesting permissions that allow them to collect data, display intrusive ads or run background processes without user awareness.
Common red flags:
- Requests for access to contacts, storage or SMS
- Background activity when not in use
- Frequent pop-up ads
4. Games That Spy on You
Risk level: Medium to high
Primary threat: Behavioural tracking and location data exposure
Who’s most at risk: Frequent mobile gamers
Free-to-play mobile games are one of the biggest data collectors on smartphones. While some data collection is legitimate, many games go beyond what’s necessary for gameplay.
Some track approximate location, monitor usage behaviour across apps or collect device identifiers to build detailed advertising profiles, often without users realising what they’ve agreed to.
Common red flags:
- Location access for non-location games
- Requests for storage or microphone permissions
- Aggressive advertising SDKs (software development kits)
5. Subscription Trap & Free Trial Scam Apps
Risk level: Medium
Primary threat: Ongoing financial loss
Who’s most at risk: Bargain hunters and casual downloaders
These apps are designed to monetise confusion. They lure users in with ‘free trials,’ limited-time offers or vague pricing, then quietly roll users into expensive recurring subscriptions that are difficult to cancel or easy to overlook. In many cases, users don’t realise they’ve been charged until weeks or months later.
Common red flags:
- No clear pricing page
- Complicated cancellation process
- Generic app descriptions offering ‘premium features’
6. AI Face Swapping & Photo Editing Apps
Risk level: Medium
Primary threat: Biometric data misuse
Who’s most at risk: Social media and AI trend users
AI-powered photo and face editing apps have surged in popularity, but they often come with serious privacy trade-offs. Many require users to upload facial images to external servers, where biometric data may be stored indefinitely, reused for training AI models, or shared with third parties.
Once uploaded, images can be difficult (or impossible) to delete.
Common red flags:
- No transparency about image storage
- Broad rights granted in terms and conditions
- Servers located outside regulated jurisdictions
7. Fake ‘Optimisation’, Cleaner & Booster Apps
Risk level: Medium
Primary threat: Adware and misleading functionality
Who’s most at risk: Users with older or slower devices
Modern smartphones already manage memory and performance effectively. Apps claiming to boost speed, clean RAM or optimise the phone’s battery are often unnecessary and sometimes harmful. Many exist primarily to display ads, collect data or upsell paid versions with little real benefit.
Common red flags:
- Promises of dramatic performance improvements
- Constant upgrade prompts
- Heavy ad placement
The 5 Most Dangerous Website Types to Avoid


Dangerous websites don’t always look suspicious. Many are designed to appear polished, familiar and trustworthy, often mimicking well-known brands or offering something enticing to lower your guard.
Malicious websites rely on speed, distraction and familiarity. They work best when users are tired, rushed or browsing on small screens where details are easy to miss. If a website pushes urgency, offers something unrealistically generous or asks for sensitive information unexpectedly, it’s worth closing the tab and double-checking elsewhere.
Below are the five most common types of malicious websites targeting smartphone users, and how they typically cause harm.
1. Fake Login Pages & Phishing Websites
Risk level: Very high
Primary threat: Credential threat and account takeover
Who’s most at risk: Mobile shoppers and online bankers
These websites closely mimic real login pages for banks, email providers, delivery services or social media platforms. They are often accessed via links in emails or text messages and capture login details instantly once entered.
Common red flags:
- Requests for login details outside official apps
- Generic greetings (e.g. ‘Dear customer’)
- Links that don’t match the claimed brand
2. Lookalike URLs & Imposter Websites
Risk level: Very high
Primary threat: Credential threat and account takeover
Who’s most at risk: Mobile shoppers and online bankers
These sites rely on visual deception. Scammers create web addresses that closely resemble legitimate ones by swapping letters, adding characters or using numbers in place of letters (for example, amaz0n,com instead of amazon.com). On mobile screens, these differences are easy to miss.
Common red flags:
- Slight spelling changes in the URL
- Missing or generic contact information
- Requests to log in immediately
3. Free Download & Streaming Websites
Risk level: Very high
Primary threat: Malware and ransomware
Who’s most at risk: Users seeking free content
Sites offering free movies, cracked software or premium content without payment often hide malicious payloads behind download buttons. Instead of the content promised, users may unknowingly install spyware, adware or ransomware onto their device.
Common red flags:
- Multiple fake ‘Download’ buttons
- Requests to install additional apps or profiles
- Redirects to unrelated sites
4. ‘You’ve Won a Prize!’ Pop-Ups & Giveaway Scams
Risk level: High
Primary threat: Malware installation and phishing
Who’s most at risk: Users clicking pop-ups or ads
These websites are designed to exploit curiosity and excitement. They usually appear as pop-ups or redirects claiming you’ve won a prize, survey reward or exclusive offer, often branded with familiar logos to appear legitimate. Clicking through can trigger malware downloads, phishing forms or push notification abuse.
Common red flags:
- Urgent language (‘Claim now’ or ‘Expires today’)
- Requests for personal details to ‘verify’ your prize
- Prompts to enable notifications
5. Fake Shopping & ‘Too-Good-to-Be-True’ Deal Sites
Risk level: High
Primary threat: Payment fraud
Who’s most at risk: Bargain hunters and impulse buyers
These websites advertise popular products at heavily discounted prices, often promoted through social media ads or sponsored posts. Once payment details are entered, users may receive counterfeit goods, nothing at all or have their card details reused for fraud.
Common red flags:
- Prices far below market value
- No company address or customer support
- Recently registered domains
How Do Dangerous Apps and Websites Collect Your Data?
Every tap, swipe, search and pause leaves behind a digital footprint. Apps and websites don’t just observe what you do; they record it, analyse it and often share it.
On legitimate platforms, this data is usually used to improve functionality or personalise content. On dangerous apps and malicious websites, the same data is used very differently – to manipulate, exploit or defraud.
Not all tracking is bad. In fact, most mainstream apps and websites collect some data to:
- Personalise your experience: preferences are saved across sessions, so content, recommendations and settings feel tailored to you.
- Search relevant advertising: ever search for flights, then suddenly see ads for hotels and luggage? That’s behavioural targeting at work.
- Understand how features are used: developers analyse which buttons are clicked, where users drop off, and what causes crashes.
In these cases, data collection is usually disclosed and regulated. The problem arises when data collection becomes excessive, hidden or exploitative.
Here are the most common methods used and how they’re abused.
1. Tracking Pixels and Cookies
Tracking pixels are tiny, invisible images embedded in websites, emails and apps. Cookies are small files stored on your device. Together, they can:
- Track pages you visit
- Record how long you stay
- Link behaviour across sessions and sites
On dodgy websites, these tools are often used to build detailed behavioural profiles that are shared across multiple third parties, without meaningful consent.
2. Device Fingerprinting
Even without cookies, apps and websites can identify you using a combination of:
- Device model
- Operating system
- Screen size
- Language settings
- IP address
This creates a near-unique ‘fingerprint’ that allows tracking even if you clear cookies or use private browsing.
3. Excessive App Permissions
Many dangerous apps rely on permissions rather than exploits. Once granted, they can:
- Read contacts
- Access photos and files
- Monitor location
- See on-screen activity
The more permissions an app has, the more data it can quietly collect in the background.
4. Session Replay & Behaviour Monitoring Tools
Some apps and websites use tools that record how users interact, including taps, scrolling and form inputs. On legitimate sites, this helps improve usability. On malicious ones, it can capture:
- Login credentials
- Payment details
- Personal messages
In extreme cases, it’s effectively screen recording without your knowledge.
5. Data Aggregation and Resale
Once collected, data rarely stays in one place. Dangerous apps and websites may:
- Sell data to data brokers
- Share it with unknown advertising networks
- Combine it with leaked or breached datasets
This is how small pieces of information can be stitched together into full identity profiles.
How to Stay Safe: Practical Steps to Protect Your Phone


Staying safe online doesn’t require technical expertise; it requires awareness, consistency and a few good habits. Most scams succeed not because of advanced hacking, but because users are rushed, distracted or unaware of the warning signs. The steps below are designed to help you spot trouble before it costs you money, data or control of your device.
Red Flags to Watch for with Dangerous Apps
Most dangerous apps don’t come from nowhere; they rely on users skipping checks or trusting convenience over caution.
Protect yourself by:
- Sticking to official app stores such as Apple’s App Store or the Samsung Galaxy Store
- Avoiding downloads from third-party websites or direct links
- Checking app permissions carefully before installing
- Reviewing update history – apps that haven’t been updated in months may contain unpatched security flaws
Red Flags to Watch for on Dangerous Websites
Malicious websites are designed to look convincing at a glance, especially on small mobile screens. Paying attention to a few details can prevent most web-based scams.
Watch out for websites that:
- Use HTTP instead of HTTPS (secure sites show a padlock icon)
- Look low effort with bad spelling, strange fonts or outdated design
- Offer free versions of paid content, such as movies, software or subscriptions
- Pressure you to act quickly with pop-ups or countdown timers
The 5-Step Checklist Before You Download Any App
Run this quick check every time you install something new:
- Check the developer name, not just the app title.
- Read the lowest reviews, not just the highest.
- Review permissions and ask if they make sense.
- Search the app name + “scam.”
- Ask yourself: does this app really need to exist?
If any step raises doubt, don’t install.
Detection Tools You Can Use
You don’t have to guess whether something is safe. These free tools can help you verify links, apps and data exposure:
- VirusTotal: scan URLs and files for known threats
- URLVoid: check the reputation and history of websites
- Have I Been Pwned: see if your email address appears in known data breaches
A reputable mobile security app can provide real-time protection against malware, phishing attempts and unsafe websites, particularly on Android devices, which allow more system-level access.
Apple iOS users benefit from strong built-in security controls, but no system is immune to scams, phishing links or social engineering attacks. Vigilance still matters.
What to Do If You’ve Installed a Dangerous App
If you suspect you’ve installed a dangerous or malicious app, act quickly but don’t panic. The steps below are designed to limit damage and regain control of your device as fast as possible. Speed matters but doing things in the right order matters more.
1. Disconnect from the internet immediately
Turn off Wi-Fi and mobile data as soon as possible. This prevents the app from:
- Sending data off your device
- Downloading additional malware
- Communicating with remote servers
If the app relies on internet access, cutting the connection can stop further harm.
2. Uninstall the app straight away
Delete the app as soon as your device is offline. If the app refuses to uninstall:
- Check whether it has device administrator or accessibility permissions enabled
- Revoke those permissions first, then remove the app
Restart your phone after uninstalling to clear any lingering processes.
3. Change your passwords
Assume that any account logged into on your phone could be compromised. Prioritise:
- Email accounts
- Banking and payment apps
- Apple ID or Google accounts
- Social media and cloud storage
Use strong, unique passwords and enable two-factor authentication (2FA) wherever possible.
4. Check your financial accounts carefully
Review your recent activity on:
- Bank accounts
- Credit cards
- PayPal or other payment services
- App store subscriptions
Look for:
- Unrecognised transactions
- New subscriptions you didn’t authorise
- Changes to account details
If you see anything suspicious, contact your bank immediately.
5. Run a full mobile security scan
Use a reputable mobile security app to scan your device for:
- Malware
- Hidden files
- Suspicious behaviour
This helps ensure no secondary threats remain after the app is removed.
Upgrade Your Phone, Not Your Risk with 4gadgets
Does your phone feel sluggish after clicking a few dodgy links (we won’t judge)? Maybe it’s time for an upgrade?
At 4gadgets, we offer refurbished Samsung and Apple smartphones that come packed with the latest operating systems and security features – whether it’s the iPhone 16 or the Samsung Galaxy S24 Ultra. And you can get them without the eye-watering price tag too.
Grab your refurbished smartphone from 4gadgets and stay one step ahead of the scammers! (Psst! You can enjoy free next-day delivery if you order before 3pm Monday to Friday too!)


