The fact described in the text is that there are limited-time free Android apps and games available, including an Offline Password Manager app that securely stores passwords without unnecessary features.
Google has introduced a yellow warning banner in the Google Play Store to alert Android users about apps that are frequently uninstalled. This banner indicates that an app may not be meeting user expectations and could be due to poor functionality, excessive advertisements, or inflated costs. Additionally, Google has implemented two other notifications: one indicating lower user engagement with an app and another showing fewer users compared to other apps. These features aim to help users make more informed app choices and avoid potentially harmful applications. Google Play Protect is also available to scan downloaded apps for security, including those from outside the Play Store. Users can enable settings to improve harmful app detection, enhancing overall safety in the app ecosystem.
A sophisticated trojan named TsarBot is targeting over 750 legitimate banking and shopping applications on Android devices. It overlays a counterfeit login screen on real apps to capture user credentials. TsarBot is believed to have Russian origins and can remotely control the device's screen, simulating user interactions and capturing device lock credentials through a deceptive lock screen. The trojan is typically installed from phishing websites, where a dropper application delivers the TsarBot APK file. Once installed, it disguises itself as the Google Play Services app and urges users to enable Accessibility services. Users are advised to avoid installing apps from outside the Google Play Store, ensure Play Protect is enabled, and only enable Accessibility Services when necessary to mitigate risks.
Among Us is a game set aboard an abandoned spaceship where players are part of a crew with some impostors among them. The goal is for the crew to successfully eject the impostors.
Google warns Android users about the risks of downloading apps from sources outside the Google Play Store, noting that such apps are 50 times more likely to contain malware. In 2023, Google removed around 2.3 million suspicious apps from the Play Store and banned over 300 apps that circumvented Android's security measures, which had over 60 million downloads and were involved in deceptive advertising and phishing schemes. Google is enhancing its Play Protect Live Threat Detection system to combat fake and dangerous apps. Recommendations for protecting phones include downloading apps only from the Google Play Store, checking reviews and ratings, installing security updates, and avoiding unknown links.
Google's AI-driven threat detection and security measures blocked approximately 2.36 million policy-violating applications from being released on the Play Store last year. In February, Google removed hundreds of malicious applications that were infecting devices with adware and malware. Over 50 times more Android malware originates from internet-sideloaded sources compared to those found on the Play Store. Google is expanding its Play Protect feature across all applications and the upcoming Android 15 will introduce live threat detection. Sophos warned about PJobRAT malware, which can steal SMS messages, contacts, and files from infected Android devices. Experts advise against sideloading apps unless their legitimacy and security are certain.
Prince of Persia: The Lost Crown is set to debut on Android and iOS devices on April 14. Players take on the role of Sargon, a warrior on a mission to rescue Prince Ghassan. The game features fast-paced combat, parkour moves, and puzzles, with time-manipulating abilities. Developed by Ubisoft Da Nang, the game runs at 60 frames per second and offers touch screen or external controller options. The mobile version includes features like auto-potion, auto-parry, and slow time options, as well as accessibility features that won an award. Pre-registration is now open on the iOS App Store and Google Play Store.
Keeper Security has enhanced its Keeper WearOS app, previously known as KeeperDNA, to improve security and user experience for smartwatch users. The app now aligns with Google's Android guidelines, featuring a modern interface that allows users to securely view stored credentials and utilize Two-Factor Authentication (2FA) more easily. Key features include Time-Based One-Time Password (TOTP) code viewing, Watch Favorites for quick access to frequently used logins, and improved offline functionality that allows users to access Keeper data without an internet connection. The account setup process has been simplified, and users can manage offline access and 2FA settings separately. The updated app is available on the Google Play Store and supports zero-knowledge encryption. Future updates are planned to include passkey support and standalone functionality for managing security directly from wearable devices.
Keeper Security has launched an updated version of its WearOS app for Android, enhancing security and user experience for smartwatch users. The app, formerly known as KeeperDNA, features a redesigned interface, instant access to credentials and 2FA codes, and a "Watch Favorites" option for quick access to frequently used logins. Improvements to offline functionality include a simplified account setup, enhanced offline mode with configurable vault access durations, and decoupled offline mode and 2FA settings. The updated app is available for download on the Google Play Store and maintains zero-knowledge encryption for user data security.
Cybercriminals are using Microsoft’s .NET MAUI framework to create advanced Android malware that bypasses security measures and compromises user data. A study by McAfee researchers highlights a rise in malicious apps developed with this tool since its introduction in May 2022. These apps often impersonate legitimate applications, particularly from financial institutions, and are distributed through third-party websites or alternative app stores. One example is a counterfeit app mimicking the official IndusInd Bank app, targeting users in India to extract sensitive information. Another variant targets Chinese-speaking users by disguising itself as a social networking service.
The malicious apps are designed to be subtle, with harmful code concealed as blob files within the assemblies directory, making detection difficult for antivirus solutions. Hackers use multi-stage dynamic loading, where the Android executable file is loaded in three stages, each encrypted until execution. They also manipulate the AndroidManifest.xml file by adding excessive permissions, complicating analysis and detection. Additionally, attackers replace standard HTTP requests with encrypted TCP socket connections to evade security software. These evolving tactics indicate a potential increase in similar mobile malware threats in the future.