million downloads

AppWizard
May 9, 2026
Cybersecurity researchers from ESET have discovered 28 fraudulent applications on the Google Play Store that falsely claimed to provide access to call histories for any phone number. These apps have been downloaded over 7.3 million times, with one app alone accounting for over 3 million downloads. The operation, named CallPhantom, primarily targeted Android users in India and the Asia-Pacific region. Users were lured into subscription services, paying for access to fictitious data, including call histories and SMS records, but received only randomly generated information. Some apps were published under the developer name "Indian gov.in" to create a false sense of trust. Payments were processed through the Google Play Store or third-party applications like Google Pay and Paytm. Users who subscribed via Google Play may be eligible for refunds, while those who used third-party payment methods may not be able to recover their funds. The fraudulent activity may have been ongoing since at least November 2025.
AppWizard
May 8, 2026
Security researchers at ESET uncovered a scam involving 28 applications named "CallPhantom," which collectively amassed over 7.3 million downloads on the Google Play Store. These apps promised access to call histories, SMS records, and WhatsApp call logs for any phone number, raising privacy concerns. They requested intrusive permissions from users' devices, leading to potential privacy violations. Payment structures varied, with some using Google Play's billing system and others circumventing it through third-party methods. ESET reported the apps to Google in December 2025, resulting in their removal from the Play Store. A recent search confirmed that these apps are no longer available.
AppWizard
May 8, 2026
Researchers uncovered a scam involving 28 fraudulent applications on the Google Play Store, collectively called "CallPhantom," which garnered over 7.3 million downloads. These apps promised access to call logs, SMS records, and WhatsApp history for any phone number, but users received fabricated data after paying a fee. The apps varied in appearance but shared a common strategy of generating random phone numbers and pairing them with pre-existing names and call details. Some requested email addresses to send the 'retrieved' history, but none had the necessary permissions to access the claimed data. Payment methods included Google Play’s official billing system and third-party platforms, with some apps misleading users into staying on subscription screens. ESET reported these apps to Google on December 16, leading to their removal from the Play Store.
AppWizard
May 8, 2026
A series of fraudulent applications known as CallPhantom have been identified on the Google Play Store, claiming to provide access to call logs, SMS records, and WhatsApp call history for a fee. A total of 28 CallPhantom apps were reported, with over 7.3 million downloads. These apps falsely generated random phone numbers and fabricated data, misleading users into paying for nonexistent services. The apps primarily targeted Android users in India, utilizing UPI for payments and often sidestepping Google Play's official billing system. Users expressed frustration in negative reviews after being scammed. The investigation revealed two clusters of deceptive applications: one that presented hardcoded data and another that promised to send call histories via email after payment. Refunds may be possible for subscriptions made through Google Play, but users who paid outside the platform must contact their payment provider or the app developer for resolution.
Tech Optimizer
May 5, 2026
Codenotary has released immudb 1.11, an open-source database that enhances immutable audit logging and compatibility with PostgreSQL. This version features integrated audit logging that captures database activities in a tamper-proof manner, eliminating the need for external logging systems. It allows organizations to create unalterable audit trails, streamline compliance processes, and maintain a reliable history of data interactions. Immudb 1.11 is compatible with existing PostgreSQL code, enabling seamless integration with various applications and tools. The database is particularly beneficial for sectors requiring trust and accountability, such as finance, software development, cybersecurity, regulated industries, AI systems, and supply chain management. Immudb has over 50 million downloads and supports a zero-trust approach to data management. The open-source version is available on GitHub.
AppWizard
April 26, 2026
Zenless Zone Zero is set to be released on PC in the second quarter of 2026, with a Steam page now available for pre-release tests and a goal of reaching 300,000 wishlists for a milestone event. The game received a mixed review score of 55% from Kerry Brunskill, who described it as a "shallow, polished front for a relentless online store." Developer MiHoYo, known for successful titles like Genshin Impact and Honkai: Star Rail, previously achieved 50 million downloads of Zenless Zone Zero within a week of its initial launch. There were speculations about a 40% chance of HoYoverse games coming to Steam due to concerns over revenue cuts, but the games have a strong following that may allow them to succeed without Steam. The Epic Games Store has faced criticism, and the release of Zenless Zone Zero may test its appeal compared to other storefronts.
AppWizard
April 25, 2026
McAfee researchers discovered a complex Android rootkit campaign, dubbed Operation NoVoice, that infiltrated 50 applications on Google Play, exploiting vulnerabilities in the kernel that had been patched but not uninstalled. The malware was resilient enough to survive factory resets and was concealed within seemingly benign apps, which collectively garnered 2.3 million downloads. The malicious payload was hidden in the com.facebook.utils package and used steganography to embed an encrypted payload within a PNG image. The malware conducted multiple checks to avoid detection and established contact with a command-and-control server, polling for exploit packages every 60 seconds. It utilized 22 distinct exploits, including vulnerabilities that had received patches between 2016 and 2021. The malware disabled SELinux enforcement and installed a persistent rootkit that could survive factory resets. Google confirmed the removal of the infected apps but noted that users who had already downloaded them remained at risk, especially if their devices were running unpatched Android versions. McAfee advised affected users to treat their devices as compromised and consider professional inspection or hardware-level storage wiping for remediation.
AppWizard
April 22, 2026
Samsung plans to retire its proprietary messaging app by July 2026, leading many Android users to rely on Google Messages. Major carriers like AT&T have stopped supporting their own messaging apps, potentially creating a monopoly. Alternative SMS-enabled apps include: - Pulse SMS: Syncs across devices, offers password-protected cloud backups, and has end-to-end encryption for stored conversations. It has a 3.6-star rating on Google Play. - Chomp SMS: Highly customizable with features like scheduled messages and block lists. It remains free with ads, but some users find the customization options complex. - Handcent Next SMS: Incorporates AI for features like text extraction and grammar checks. It has over one million downloads and a 4.4-star rating, but requests a high number of permissions. - Textra SMS: Offers faster performance and extensive customization, aiming to replace default messaging apps. It follows a "free forever" model but lacks cross-device functionality and encryption. The selection of these alternatives was based on Google Play ratings above 3.5 stars, a minimum of 50,000 user reviews, and recent updates.
Winsage
April 20, 2026
ExplorerPatcher is a free and open-source application that has over 42 million downloads and 32,200 stars on GitHub. It aims to restore legacy Windows shell components in Windows 11, allowing users to manage settings more comfortably. The app is compatible with both x86-64 Windows and Windows on ARM. Users can revert the Windows 11 taskbar to its Windows 10 design, disable the Windows 11 context menu, and restore the control ribbon in File Explorer. ExplorerPatcher offers additional features such as improved multi-display taskbar support and customizable settings. It includes preset configurations like the "Classic Windows 10" option and allows for custom configurations to be saved and shared. Despite its popularity, ExplorerPatcher is not widely recognized due to security warnings from Windows, which flag it as a potential threat, and potential disruptions following major Windows updates.
Winsage
April 20, 2026
ExplorerPatcher is a free, open-source application that has surpassed 42 million total downloads and received 32,200 stars on GitHub. It allows users to customize their Windows 11 experience by restoring features from older Windows versions, such as reverting the taskbar to its Windows 10 counterpart. The app is compatible with both x86-64 Windows and Windows on ARM. It offers a simple settings menu for adjusting the Taskbar, File Explorer, Start menu, and System Tray, as well as advanced features like improved multi-display taskbar support and a customizable Win+X menu. Users can save and share custom configurations, and there are preset options like the "Classic Windows 10" preset. Despite its popularity, ExplorerPatcher faces challenges such as being flagged by Windows' security systems and potential disruptions after major Windows updates.
Search