PanicStation.org
uk Technology & digital loss repeated permission popups • system permissions after update • permission prompts feel wrong • app asking for camera access • app asking for microphone access • app asking for contacts access • app asking for photos access • app asking for location access • unexpected privacy prompts • android permission manager • iphone privacy and security • new permissions request loop • possible malware on phone • suspicious app behaviour • update changed permissions • prompts won’t stop • device privacy panic • app privacy report iphone • permission fatigue

What to do if…
your device keeps prompting for new system permissions after an update and it feels wrong

Short answer

Pause and deny anything you don’t clearly recognise or need right now. Then use your device’s privacy settings to revoke sensitive permissions (camera, mic, location, contacts, photos/files) from any app that seems connected to the prompts.

Do not do these things

  • Don’t keep tapping “Allow” just to make the prompts stop.
  • Don’t install a random “permission manager”, “cleaner”, or “security” app to fix it.
  • Don’t sign in to your bank, email, or password manager until you’ve stabilised what’s happening.
  • Don’t click links from pop-ups or messages that claim your device is “infected” or needs “urgent verification”.
  • Don’t factory reset in a panic until you’ve noted what you need to keep and you’ve tried safer containment steps first.

What to do now

  1. Stop risky activity for a few minutes.
    Put the device down briefly. Avoid logging in, paying, or entering passwords until you’ve reviewed what’s asking for access.

  2. Deny/close the prompt unless you are completely sure it’s expected.
    If the prompt names an app you don’t recognise, choose Don’t allow. If it keeps returning, treat that as a signal to investigate, not to comply.

  3. Identify what is asking (this is the key step).

    • iPhone/iPad: Settings → Privacy & Security and review which apps have access to Microphone, Camera, Location Services, Contacts, Photos, Bluetooth, Local Network. If available, turn on and review App Privacy Report.
    • Android: Settings → Security & privacy (or Privacy) → Permission manager and check each sensitive permission type (camera, mic, location, contacts, files/photos) to see which apps currently have access.
  4. Remove the highest-risk permissions first (containment).
    For any app you don’t fully trust (or don’t use), set sensitive permissions to Don’t allow / Never / While using only (if available). Prioritise: Microphone, Camera, Location, Contacts, Photos/Files.

  5. Find the likely “trigger” app and disable it temporarily.
    If the prompts appear when you open a particular app, force close it and turn off its notifications. If you can’t tie it to any one app, review recently installed and recently updated apps first.

  6. Update and remove apps safely.
    Update apps only through the official app store. Uninstall anything you don’t recognise, don’t need, or that has a confusing “lookalike” name/icon.

  7. If you suspect compromise, secure your most important account from a different device.
    Use a trusted computer/phone to change the password for your primary email (because email controls password resets). Turn on two-step verification if you can do it calmly.

  8. If money was taken or accounts were accessed, report it promptly.

    • If you live in England, Wales, or Northern Ireland, report cyber crime and fraud to Report Fraud (the UK national reporting service).
    • If you live in Scotland, contact Police Scotland on 101 (non-emergency) or use their online reporting options.
  9. If this started with a suspicious message, report the message (without engaging with it).

    • Emails: forward to report@phishing.gov.uk.
    • Texts: forward the message to 7726 (free) to report it to your mobile provider.
      If you clicked through to a website, you can also report scam websites to the UK’s national phishing reporting service.

What can wait

  • You do not need to decide today whether this was “definitely malware” or “just a normal update”.
  • You do not need to factory reset immediately unless you can’t regain control of permissions and behaviour.
  • You do not need to contact every service you use—start with your primary email and any account that shows unusual activity.
  • You do not need to diagnose the exact technical cause before you take simple containment steps (revoking permissions, removing suspicious apps).

Important reassurance

Feeling alarmed is reasonable: permission prompts are designed to interrupt you, and “permission fatigue” makes it easy to approve something you don’t really want. Denying first and reviewing access in settings is a safe, reversible way to regain control.

Scope note

These are first steps to stabilise the situation and prevent irreversible mistakes. If the behaviour continues after you revoke permissions and remove suspicious apps, you may need device-specific help (manufacturer support or a trusted repair shop) to check for deeper issues.

Important note

This is general information, not legal, financial, or technical professional advice. If you have strong reason to think your device or accounts were compromised, prioritise protecting your primary email, banking, and important accounts, and use official reporting and support channels.

Additional Resources
Support us