Malicious Apps Continue Getting Past Google On Play Store

October 24, 2019

Written by wukovits

malicious apps continue getting past google on play storeSay what you want about Google, but the company has a solid track record of doing all they can to keep the Google Play Store relatively free of malicious apps. By most accounts, they have been wildly successful at that.

Unfortunately, given the sheer number of apps available on the Play Store, statistics invariably catch up with them.

A small number of poisoned apps, trojans and the like still find their way onto the store. They blend in with legitimate apps until some enterprising researcher discovers them, at which point, Google promptly brings the hammer down.

The question is, why does it keep happening?  It’s a fair question, but it’s important to put it in proper context.  After all, more than 99 percent of the apps on the Play Store right now are perfectly fine, so Google’s robust system of checks and strict guidelines are certainly working.

The problem is, nobody ever reports on the fact that the majority of the time, the system works as advertised.  We only tend to hear about the instances where something goes off the rails and an unsavory developer temporarily pulls the wool over Google’s eyes.

At the end of the day, the answer is simply this:  No system, no matter how robust, is perfect.  Google generally does a good job of policing its Play Store, which is why it’s seen as one of the safe havens on the internet.

Having said that, there’s always room for improvement. To the company’s credit, Google is in the habit of regularly and methodically improving its own processes. Even so, a certain amount of due diligence is required on the part of the user, even when downloading apps from a supposedly safe source.  We can’t fault Google for the actions of careless users. We can’t blame them for the actions of determined, unsavory developers who occasionally find ways to temporarily circumvent the company’s safeguards.

Used with permission from Article Aggregator

Bayou Tech

We provide solutions for your business. Find out how we can help.

Related Articles

Key Considerations for Effective Cybersecurity Implementation

Consider this: In the realm of cybersecurity, things often get tangled in the web of "you should do it anyway" arguments. Yet, for busy business owners bombarded with daily "must-dos," deciphering the essentials from the fluff can feel like a cyber maze. We aim to...

Major Cyber Attack at OMV

Louisiana’s Office of Motor Vehicles (OMV) is one of a still undetermined number of government entities, major businesses, and organizations to be affected by an unprecedented Data Breach.There is no indication at this time that cyber attackers who breached MOVEit...