Google Bans Thousands Of Malicious Developers

Google has blocked 173,000 malicious developers and fraud rings, preventing over $2 billion in fraudulent and abusive transactions, the company said in its security blog post.
 
In 2022 Google prevented 1.43 million policy-violating apps from being published on Google Play. 
The Google Play Commerce security team also blocked fraudulent and abusive transactions that could've led to more than $2 billion in losses. 

The US tech giant also said it is also making it harder for malicious developers to get their software published on its Play store.

Over the year, Google also updated its Play Store to include a Data Safety section that details how apps collect, share, and secure users’ data. And it has removed large amounts of bad accounts and added phone, email, and other identity verification methods.

This process has helped them reduce the number of accounts used to publish apps that violate its policies.

Google has also been working on making the Android ecosystem safe for users. They have created stronger Android platform protections and policies that have prevented a large number of apps from accessing sensitive permissions over the past three years. Further, Google has launched an App Security Improvements program that has helped fix security issues that impact thousands of apps.

A Helpline pilot was launched in 2022 to give developers assistance on policy queries.  A new Google Play Developer Community is also in pilot, which will provide a platform for developers to discuss policy and more.

Unfortunately, despite all these efforts, malicious apps continue to make their way onto the Play store.

Google says,”Keeping Google Play safe for users and developers remains a top priority for Google. Google Play Protect continues to scan billions of installed apps each day across billions of Android devices to keep users safe from threats like malware and unwanted software.”

Google:   Oodaloop:     Infosecurity Magazine:      The Hindu:     Security Week:    Information Security Buzz:   

Bleeping Computer

You Might Also Read: 

Mobile Cyber Attacks: The Different Facets Of Smartphone Malware:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ‘Tyrannical IT’ Is A Critical Threat
Why Zero Trust Is Fundamental In Today’s Economic Climate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.