Galaxy Store

BetaBeacon
January 13, 2026
Samsung has removed the Creature Collection feature from its Gaming Hub app, which allowed players to unlock collectible "monsters" by progressing through games and hatching virtual eggs. Despite this change, all the unlockable monsters are now available for users to set as their display pictures inside the app without having to complete specific missions or reach certain progress levels.
AppWizard
November 18, 2025
The Samsung Internet Browser app can be installed from the Play Store and the Galaxy Store. An upcoming update with One UI 8.5 is expected to coincide with the Galaxy S26 series launch. The update will feature a new icon, a revamped welcome screen, and a floating address bar that disappears while scrolling. Users will be able to block fixed-position pop-ups, and the tab management layout will resemble the Gallery app's grid view. A compact floating bar will allow customization of button arrangements. Users will also be able to "like" videos directly from the browser, and the browser will check for APK availability in the Galaxy Store during downloads. Additionally, a pop-up will offer the option to close all open tabs when closing the browser, with the ability to disable this feature for future sessions.
AppWizard
November 14, 2025
Android 17 will introduce a system for "Registered App Stores," allowing third-party app stores that meet Google's certification standards to benefit from a unified installation interface. Users will see a straightforward prompt when installing a certified app store, with clear explanations and links to essential information. Certified stores will automatically gain permission to install and manage other applications, simplifying the installation process and improving user experience. The initiative will reduce barriers imposed by OEMs, ensuring a consistent installation process across devices. Security measures will remain intact, with Google Play Protect continuing to scan apps from all sources. The new system will be integrated into Android 17, with potential support in the initial release or by Android 17 QPR2. Competing app stores will not be able to promote themselves through Google Play, but users can still access certain titles directly through their respective apps.
AppWizard
October 3, 2025
ESET researchers have identified two Android spyware campaigns targeting users in the UAE, disguised as messaging applications Signal and ToTok. The first spyware family, Android/Spy.ProSpy, poses as upgrades for these apps, while the second, Android/Spy.ToSpy, specifically targets ToTok users. Both malware families were not found on official app stores and were distributed through phishing websites. The ProSpy campaign, active since 2024, uses deceptive sites to offer malicious APK files as enhancements. The ToSpy campaign, identified since mid-2022, targets ToTok backup files and has ongoing operations. Both spyware types collect extensive data, including contacts and SMS messages, and maintain persistent background operations. Google Play Protect offers some defense against these threats, and users are advised to avoid unofficial app installations.
AppWizard
October 2, 2025
Cybersecurity researchers have discovered two families of Android spyware that impersonate messaging applications Signal and ToTok, linked to campaigns named ProSpy and ToSpy. ToTok was discontinued in 2020 after being identified as a surveillance tool for the UAE government, but the spyware is disguised as an enhanced version called ToTok Pro. The spyware requests extensive permissions upon installation and exfiltrates sensitive data. It was distributed through third-party websites posing as legitimate services, with confirmed detections in the UAE, indicating a targeted operation. The spyware campaigns primarily aim at privacy-conscious residents in the UAE, as suggested by the domain name ending in “ae.net.”
AppWizard
October 2, 2025
Recent investigations by cybersecurity firm ESET revealed that new spyware campaigns in the UAE are targeting messaging apps. Two Android spyware campaigns, named ProSpy and ToSpy, are disguised as popular communication tools—Signal and ToTok. These spyware programs infiltrate devices through deceptive websites and unofficial app stores, enabling the theft of sensitive data such as files, contacts, and chat backups. The spyware reloads legitimate apps to create an illusion of authenticity. ESET identified command-and-control servers indicating that the ToSpy campaign is still active, and these spyware-laden apps can only be installed manually via third-party websites. The ToSpy malware was detected in June, with origins traced back to 2022, while the ProSpy campaign was also identified in June, potentially starting in 2024. Both campaigns utilize malicious Android Application Packages (APKs) disguised as enhancements to original applications.
AppWizard
October 2, 2025
ESET Research has identified two new families of Android spyware: Android/Spy.ProSpy and Android/Spy.ToSpy. These malware campaigns target users of secure communication apps, specifically Signal and ToTok, and are distributed through deceptive websites and social engineering, primarily focusing on residents of the United Arab Emirates (UAE). Android/Spy.ProSpy pretends to be upgrades for the Signal and ToTok apps, while Android/Spy.ToSpy targets ToTok users exclusively. Both spyware families require manual installation from unofficial sources, as they are not available in official app stores. The ProSpy campaign was first noted in June 2025 but is believed to have been active since 2024, using misleading websites to distribute malicious APKs. ESET's findings indicate that the ToSpy campaigns are still ongoing, with command and control servers still operational. The spyware collects sensitive data, including contacts, SMS messages, and files, once installed. Users are advised to be cautious when downloading apps from unofficial sources and to avoid enabling installations from unknown origins.
AppWizard
October 2, 2025
Cybersecurity researchers have identified two Android spyware campaigns, ProSpy and ToSpy, targeting users in the United Arab Emirates by impersonating popular applications like Signal and ToTok. These malicious applications are distributed through deceptive websites and social engineering tactics, requiring manual installation from third-party sites. The ProSpy campaign, active since 2024, uses misleading sites to host compromised APK files marketed as upgrades to Signal and ToTok. The ToSpy campaign, initiated around June 30, 2022, also employs counterfeit sites to deliver malware. Both spyware variants aim to steal sensitive data, including contacts, SMS messages, and files. The ProSpy app, ToTok Pro, contains a button that redirects users to the legitimate ToTok download page, while the Signal Encryption Plugin misleads users into downloading the genuine app. Both spyware types exfiltrate data before user interaction and maintain persistence through a foreground service and Android's AlarmManager. ESET is tracking these campaigns separately due to their different delivery methods, and the identities of those behind the activities remain unknown. Users are advised to be cautious when downloading apps from unofficial sources.
Search