installing apps

AppWizard
November 13, 2025
Google announced plans to implement restrictions next year that will block users from installing apps created by unverified developers, prompting backlash from the Android community. In response, Google introduced an "advanced flow" for experienced users willing to accept risks associated with installing unverified software, which will include clear warnings about the risks involved. Additionally, Google is launching an early access program for developers who distribute apps outside of the Play Store, allowing them to verify their identity before the new requirements take effect. Further details on this feature are expected in the coming months.
AppWizard
November 11, 2025
Android users will soon see a red warning badge on the Google Play Store indicating that an app “may use more battery than expected.” This feature, developed with Samsung, targets apps that misuse “partial wake locks,” which can lead to significant battery drain. The update introduces a metric to monitor “excessive partial wake locks,” flagging apps that maintain over two cumulative hours of non-exempt wake locks in a 24-hour period. If at least 5% of an app’s user sessions exceed this threshold over 28 days, it will be marked as a battery drain culprit. Starting March 1, 2026, such apps will have reduced visibility in the Play Store and will display a red warning label about high background activity and potential battery drain. This initiative aims to improve battery performance and encourage developers to optimize their apps.
AppWizard
November 6, 2025
Google and Epic Games reached a settlement regarding the lawsuit Epic initiated in 2020, challenging Google's dominance in Android app distribution. The settlement includes changes in the upcoming Android 17 release, such as introducing "Registered App Stores," which are certified third-party app stores that users can install easily. The installation process will be simplified with a "single store install screen" and reduced user intervention for app installations. Google will also allow developers to use alternative payment options for in-app transactions, moving away from the exclusive use of Google Play Billing. Service fees on alternative payment methods may range from up to 20% to 9%. Google has committed to not discouraging OEMs or developers from collaborating with third-party app stores and will not restrict their pre-installation or home screen placement for three years following the agreement.
AppWizard
October 2, 2025
ESET Research has identified two new families of Android spyware: Android/Spy.ProSpy and Android/Spy.ToSpy. These malware campaigns target users of secure communication apps, specifically Signal and ToTok, and are distributed through deceptive websites and social engineering, primarily focusing on residents of the United Arab Emirates (UAE). Android/Spy.ProSpy pretends to be upgrades for the Signal and ToTok apps, while Android/Spy.ToSpy targets ToTok users exclusively. Both spyware families require manual installation from unofficial sources, as they are not available in official app stores. The ProSpy campaign was first noted in June 2025 but is believed to have been active since 2024, using misleading websites to distribute malicious APKs. ESET's findings indicate that the ToSpy campaigns are still ongoing, with command and control servers still operational. The spyware collects sensitive data, including contacts, SMS messages, and files, once installed. Users are advised to be cautious when downloading apps from unofficial sources and to avoid enabling installations from unknown origins.
AppWizard
October 2, 2025
Cybersecurity researchers have identified two Android spyware campaigns, ProSpy and ToSpy, targeting users in the United Arab Emirates by impersonating popular applications like Signal and ToTok. These malicious applications are distributed through deceptive websites and social engineering tactics, requiring manual installation from third-party sites. The ProSpy campaign, active since 2024, uses misleading sites to host compromised APK files marketed as upgrades to Signal and ToTok. The ToSpy campaign, initiated around June 30, 2022, also employs counterfeit sites to deliver malware. Both spyware variants aim to steal sensitive data, including contacts, SMS messages, and files. The ProSpy app, ToTok Pro, contains a button that redirects users to the legitimate ToTok download page, while the Signal Encryption Plugin misleads users into downloading the genuine app. Both spyware types exfiltrate data before user interaction and maintain persistence through a foreground service and Android's AlarmManager. ESET is tracking these campaigns separately due to their different delivery methods, and the identities of those behind the activities remain unknown. Users are advised to be cautious when downloading apps from unofficial sources.
AppWizard
October 2, 2025
ESET researchers have identified two Android spyware campaigns, Android/Spy.ProSpy and Android/Spy.ToSpy, targeting users of secure messaging apps like Signal and ToTok. These spyware families are distributed through deceptive websites and social engineering tactics, requiring manual installation from unofficial sources. The ProSpy campaign, operational since 2024, uses fraudulent websites to distribute malicious APKs disguised as a Signal Encryption Plugin and ToTok Pro, particularly targeting users in the UAE. The ToSpy campaign, discovered in June 2025, also targets users in the UAE, utilizing fake distribution sites impersonating the ToTok app. Both spyware types request access to contacts, SMS messages, and files, exfiltrating sensitive data in the background. ESET advises users to be cautious when downloading apps from unofficial sources.
Search