social engineering tactics

AppWizard
March 20, 2026
Google has introduced a new sideloading process for Android that includes a 24-hour waiting period and multiple steps for installing apps from unverified developers. The steps are as follows: 1. Enable Developer Mode. 2. Confirm you’re not being coerced into disabling device protections. 3. Restart your phone. 4. Wait 24 hours. 5. Re-authenticate using biometric authentication or a PIN. 6. Install the app, with a warning about its unverified status. This change aims to enhance user safety and protect less experienced users from scams. The new rules will take effect in August, primarily affecting users who sideload apps from third-party sources, while those using the Play Store will not see changes. Google is also requiring app developers to verify their identities to reduce the risk of malicious applications. Exceptions exist for limited distribution apps that can be shared without full verification.
AppWizard
February 19, 2026
Google has reported significant improvements in app security for Android in 2025, preventing over 1.75 million policy-violating apps from entering the Play Store and removing more than 80,000 developer accounts attempting to distribute malware. The integration of AI models into the app review process has enhanced the speed and accuracy of identifying malicious patterns. Additionally, Google blocked over 255,000 apps from requesting unnecessary sensitive data and eliminated 160 million spam ratings and reviews. Google Play Protect now evaluates over 350 billion apps daily, identifying 27 million new malicious apps outside the Play Store and blocking 266 million risky installation attempts across 185 markets. A new measure has been implemented to prevent users from disabling Play Protect during phone calls to combat social engineering tactics. Future plans include democratizing developer verification and simplifying protection against "tapjacking" attacks in Android 16.
Winsage
February 16, 2026
Microsoft has identified at least six zero-day vulnerabilities in Windows and Microsoft Office that were actively being exploited by hackers before patches were released. These vulnerabilities allow attackers to compromise systems with minimal user interaction, such as clicking on malicious links or opening compromised Office documents. Notable examples include a Windows Shell Security Bypass (CVE-2026-21510) and an Office File Exploit that can execute malicious code. The vulnerabilities pose serious risks, including active exploitation, remote code execution, and the potential for malware installation and credential theft. Microsoft has released security patches to address these vulnerabilities, and users are urged to install them immediately. The affected systems include all supported versions of Windows and Microsoft Office applications. Users are advised to install updates, be cautious with emails and links, enable security tools, and keep software up to date.
AppWizard
January 26, 2026
Google is enhancing the safety of Android users by complicating the process of sideloading applications to reduce security threats. This change aims to inform users about the dangers of installing unverified applications, as criminals often exploit sideloading through social engineering tactics. Last year, Google introduced new developer verification requirements and a revised installation flow to highlight these risks. The new process is designed to resist coercion, ensuring users are not misled into bypassing safety measures. Advanced users will still have the option to sideload apps but through a more challenging process. Additionally, a survey by Bitdefender indicates that while smartphones are commonly used for transactions, many users lack an understanding of their vulnerabilities, leading to increased risks from cybercriminals.
Search