Android applications.

AppWizard
January 16, 2026
The past year saw a 45% increase in new vulnerabilities targeting Android. By the end of 2024, there are projected to be 2.87 million apps on Google Play, with 66% of American employees using personal smartphones for work. Mobile applications are responsible for 70% of digital interactions, and vulnerabilities in these apps contributed to approximately 40% of data breaches involving personal data in 2023. Effective Android App Vulnerability Scanners analyze app security by identifying insecure local storage, hardcoded credentials, weak cryptography, insecure network configurations, broken authentication flows, and misconfigured components. AI-powered scanners, like AutoSecT, can autonomously generate new scanning protocols quickly, detect zero-day vulnerabilities, automate penetration testing, and operate with near-zero false positives.
AppWizard
November 26, 2025
Zimperium's zLabs team has revealed that many popular Android applications still use an outdated mapping component, libmapbox-gl.so, which was deprecated in 2023. This legacy library is embedded in thousands of active applications, including leading travel, airline, and weather apps, and contains known security vulnerabilities that could be exploited by malicious actors. Zimperium is working with Google through the App Defense Alliance to improve app security and advises developers to switch to Mapbox Maps SDK v10+ or MapLibre. Their analysis found that thousands of Android apps contain the vulnerable library, with 40% of these apps ranking among the top 20 in their Play Store categories, posing significant risks for employee devices and enterprise security.
AppWizard
November 14, 2025
Google is recalibrating its "Developer Verification" initiative, originally set to launch in 2026, which aimed to prevent malware from sideloaded applications by requiring verified developer identities for app installations on certified Android devices. The initiative faced backlash from users and developers due to the registration process, which involved a fee and government identification, leading to reports to national regulators and decreased participation in the early access program. F-Droid, a third-party app store, criticized the initiative, claiming it was more about consolidating control than enhancing security.
AppWizard
November 12, 2025
The Steam Frame is a new device from Valve that represents its entry into mobile gaming, functioning similarly to a wireless VR headset or a Steam Deck. It features an Arm-based Qualcomm Snapdragon chip and aims to integrate Android applications into its ecosystem. Valve is encouraging developers to adapt their Android applications for the Steam Frame, launching a developer kit program to facilitate this. The device is expected to run code natively on the Arm processor, enhancing performance. While Valve's primary focus is on gaming, there is potential for broader software integration, including tools like Discord and Blender. Plans for rich browser integration are also in development. Users will have the option to sideload Android APKs, and Valve may adapt SteamOS for various Arm-based devices in the future.
AppWizard
November 3, 2025
Researchers from Zimperium zLabs have identified over 760 Android applications exploiting Near-Field Communication (NFC) and Host Card Emulation (HCE) technologies to illegally acquire payment data. Since April 2024, there has been a significant increase in NFC relay fraud, affecting banks, payment services, and government portals globally, including Russian banks and various European financial institutions. The malware operates as paired “scanner/tapper” toolchains or standalone data collectors, exfiltrating sensitive EMV data and transmitting it to Telegram channels. Operators control these applications via command-and-control (C2) servers, allowing for fraudulent transactions with minimal user involvement. More than 70 C2 servers and numerous Telegram bots have targeted over 20 institutions worldwide, primarily focusing on Russian banks. The rise of “Tap-to-Pay” transactions has made NFC a target for cybercriminals, with harmful applications exploiting Android’s NFC permissions to steal payment data. Zimperium has provided Indicators of Compromise (IOCs) related to this campaign for safeguarding systems.
AppWizard
October 23, 2025
pCloud conducted a study on battery consumption of around 100 popular Android applications, analyzing their average battery requirements while using various features. Fitbit was identified as the top battery consumer, running 14 out of 16 background processes, with four significantly draining the battery. The Verizon app ranked second, also consuming considerable battery due to its background processes related to location services. Six social media apps—Facebook, Instagram, Snapchat, YouTube, WhatsApp, and LinkedIn—were noted for their battery drain, allowing 11 processes to run in the background. Dating apps like Grindr, Tinder, and Bumble were included in the findings but do not offer dark mode options. The Google app was highlighted as a major battery drain, with Gmail and Chrome also ranking high. Users can check their apps' battery impact through the Android power menu in the Settings app.
AppWizard
September 17, 2025
Researchers from HUMAN’s Satori Threat Intelligence and Research Team discovered a digital advertising fraud operation called “SlopAds,” which involves 224 Android applications that have over 38 million downloads across 228 countries. SlopAds employs a multi-layered obfuscation strategy to deploy fraud modules that siphon ad revenue. The applications connect to Firebase Remote Config to retrieve an encrypted configuration that conceals URLs for PNG images containing fragments of an APK, which are reassembled to create the core fraud component known as FatModule. SlopAds generates approximately 2.3 billion bid requests daily, primarily targeting users in the United States (30%), India (10%), and Brazil (7%). Google Play Protect alerts users and blocks known SlopAds applications, and Google has removed these applications from the Play Store. Users who installed these apps from off-market sources remain vulnerable until they uninstall them.
Search