Android security

AppWizard
April 3, 2026
Researchers at McAfee Labs discovered that 50 Android applications on the Google Play Store contain malware known as NoVoice, which can grant full remote access to infected smartphones. These apps have over 2.3 million downloads. The malware can communicate with remote servers, profile devices, and download tailored root exploits, potentially compromising specific hardware and software configurations. However, devices with an Android security patch level of May 2021 or later are not vulnerable to these exploits, as the vulnerabilities were patched by Android between 2016 and 2021. Google Play Protect removes these apps and blocks new installs, and users are advised to keep their devices updated with the latest security patches.
AppWizard
February 22, 2026
Google blocked approximately 1.75 million dangerous or policy-violating apps from reaching users in 2025 and shut down over 80,000 developer accounts associated with fraud, malware, and repeated policy violations. Play Protect identified millions of risky apps installed from external sources, and it scans apps in real-time, even after installation. Key reasons for app rejections include malware behavior, financial fraud, misuse of permissions, and deceptive advertisements. The crackdown results in safer app downloads, reduced risk of data theft, improved privacy enforcement, and lower exposure to counterfeit applications.
AppWizard
February 19, 2026
Google has reported significant improvements in app security for Android in 2025, preventing over 1.75 million policy-violating apps from entering the Play Store and removing more than 80,000 developer accounts attempting to distribute malware. The integration of AI models into the app review process has enhanced the speed and accuracy of identifying malicious patterns. Additionally, Google blocked over 255,000 apps from requesting unnecessary sensitive data and eliminated 160 million spam ratings and reviews. Google Play Protect now evaluates over 350 billion apps daily, identifying 27 million new malicious apps outside the Play Store and blocking 266 million risky installation attempts across 185 markets. A new measure has been implemented to prevent users from disabling Play Protect during phone calls to combat social engineering tactics. Future plans include democratizing developer verification and simplifying protection against "tapjacking" attacks in Android 16.
AppWizard
February 19, 2026
Researchers from Kaspersky have discovered an Android backdoor named Keenadu, embedded in the firmware of devices, allowing it to infect tablets before they reach consumers. This malware, affecting over 13,700 users globally, primarily targets advertising fraud by hijacking browser search engines, monitoring app installations, and generating fraudulent revenue. Tablets from various manufacturers, including Alldocube, have been found compromised, with the malware likely inserted during the firmware build stage through a compromised supply chain. Keenadu has multiple variants, some hidden in applications, and employs evasion tactics based on device language settings and time zones. It cannot be removed using standard Android security tools, and users are advised to install clean firmware or replace their devices entirely.
AppWizard
December 8, 2025
Syncthing, an open-source file synchronization tool, faced discontinuation of its official Android app in late 2024 due to Google's strict Play Store policies and lack of maintenance. In response, the community developed the Syncthing-Fork as an alternative, which integrates the core Syncthing engine and offers enhancements for Android users. The fork's development is now maintained under the researchxxl/syncthing-android repository on GitHub, addressing issues like file synchronization problems caused by Android's battery optimization features. Users have reported sync failures during device sleep, prompting discussions on workarounds. The fork has received positive feedback for its regular updates and compatibility with other tools, although challenges remain, such as intermittent issues with larger file transfers. Community involvement has been crucial for ongoing development, with contributors exploring new features and improvements. The fork is also available on F-Droid, providing an open-source distribution option.
AppWizard
November 14, 2025
Google has introduced a developer verification program that will require all app creators to undergo identity checks by 2026 to combat malware and scams in the Android ecosystem. Developers must register through the Android Developer Console or Play Console, submitting government-issued identification and possibly paying a registration fee. The program will feature both free and paid tiers, with a focus on enhancing security while maintaining Android's open nature. Only applications from verified developers will be allowed on certified Android devices by 2026, starting in high-risk markets. The initiative aims to reduce malicious applications while ensuring that verified developers' identities are not publicly listed. Concerns have been raised about potential overreach and barriers for smaller developers, but supporters view it as a positive step toward improved security.
AppWizard
November 13, 2025
Google is implementing stricter security measures on its Android platform regarding the sideloading of applications from unverified developers. All Android app developers must verify their identities via the Android Developer Console, regardless of whether they distribute through the Play Store. This verification aims to protect users from malicious actors. Once mandatory, Android may restrict app installations from unverified developers. Google plans to maintain options for advanced users to sideload apps, introducing a new flow that includes explicit warnings about potential risks. The company is currently gathering feedback on this feature and has invited developers to an early access program for verification, which will continue until March 2026.
Search