Android security

AppWizard
February 22, 2026
Google blocked approximately 1.75 million dangerous or policy-violating apps from reaching users in 2025 and shut down over 80,000 developer accounts associated with fraud, malware, and repeated policy violations. Play Protect identified millions of risky apps installed from external sources, and it scans apps in real-time, even after installation. Key reasons for app rejections include malware behavior, financial fraud, misuse of permissions, and deceptive advertisements. The crackdown results in safer app downloads, reduced risk of data theft, improved privacy enforcement, and lower exposure to counterfeit applications.
AppWizard
February 19, 2026
Google has reported significant improvements in app security for Android in 2025, preventing over 1.75 million policy-violating apps from entering the Play Store and removing more than 80,000 developer accounts attempting to distribute malware. The integration of AI models into the app review process has enhanced the speed and accuracy of identifying malicious patterns. Additionally, Google blocked over 255,000 apps from requesting unnecessary sensitive data and eliminated 160 million spam ratings and reviews. Google Play Protect now evaluates over 350 billion apps daily, identifying 27 million new malicious apps outside the Play Store and blocking 266 million risky installation attempts across 185 markets. A new measure has been implemented to prevent users from disabling Play Protect during phone calls to combat social engineering tactics. Future plans include democratizing developer verification and simplifying protection against "tapjacking" attacks in Android 16.
AppWizard
February 19, 2026
Researchers from Kaspersky have discovered an Android backdoor named Keenadu, embedded in the firmware of devices, allowing it to infect tablets before they reach consumers. This malware, affecting over 13,700 users globally, primarily targets advertising fraud by hijacking browser search engines, monitoring app installations, and generating fraudulent revenue. Tablets from various manufacturers, including Alldocube, have been found compromised, with the malware likely inserted during the firmware build stage through a compromised supply chain. Keenadu has multiple variants, some hidden in applications, and employs evasion tactics based on device language settings and time zones. It cannot be removed using standard Android security tools, and users are advised to install clean firmware or replace their devices entirely.
AppWizard
December 8, 2025
Syncthing, an open-source file synchronization tool, faced discontinuation of its official Android app in late 2024 due to Google's strict Play Store policies and lack of maintenance. In response, the community developed the Syncthing-Fork as an alternative, which integrates the core Syncthing engine and offers enhancements for Android users. The fork's development is now maintained under the researchxxl/syncthing-android repository on GitHub, addressing issues like file synchronization problems caused by Android's battery optimization features. Users have reported sync failures during device sleep, prompting discussions on workarounds. The fork has received positive feedback for its regular updates and compatibility with other tools, although challenges remain, such as intermittent issues with larger file transfers. Community involvement has been crucial for ongoing development, with contributors exploring new features and improvements. The fork is also available on F-Droid, providing an open-source distribution option.
AppWizard
November 14, 2025
Google has introduced a developer verification program that will require all app creators to undergo identity checks by 2026 to combat malware and scams in the Android ecosystem. Developers must register through the Android Developer Console or Play Console, submitting government-issued identification and possibly paying a registration fee. The program will feature both free and paid tiers, with a focus on enhancing security while maintaining Android's open nature. Only applications from verified developers will be allowed on certified Android devices by 2026, starting in high-risk markets. The initiative aims to reduce malicious applications while ensuring that verified developers' identities are not publicly listed. Concerns have been raised about potential overreach and barriers for smaller developers, but supporters view it as a positive step toward improved security.
AppWizard
November 13, 2025
Google is implementing stricter security measures on its Android platform regarding the sideloading of applications from unverified developers. All Android app developers must verify their identities via the Android Developer Console, regardless of whether they distribute through the Play Store. This verification aims to protect users from malicious actors. Once mandatory, Android may restrict app installations from unverified developers. Google plans to maintain options for advanced users to sideload apps, introducing a new flow that includes explicit warnings about potential risks. The company is currently gathering feedback on this feature and has invited developers to an early access program for verification, which will continue until March 2026.
Tech Optimizer
November 7, 2025
The AV-Comparatives Stalkerware Test 2025 evaluated 13 Android security solutions against 17 stalkerware-type applications. The test revealed that stalkerware remains a significant threat, often installed covertly and designed to evade detection. Malwarebytes achieved a perfect 100% detection rate, while Bitdefender, ESET, Kaspersky, and McAfee each detected 94%. Avast, Avira, and F-Secure identified 88%, Norton and Sophos around 82%, and G Data (65%), Google (53%), and Trend Micro (59%) had lower detection rates. The evaluation emphasized the importance of clear communication of threats to potential victims. Malwarebytes' involvement in the Coalition Against Stalkerware highlights its commitment to user safety and effective detection of stalkerware.
Search