Software

Play Store, advanced security to avoid malware content

Play Store, advanced security to avoid malware content

The problem they have seems to be clear Google and its Android mobile platform. Despite the service Google Play Protect does a great job of performing a scan before applications are installed on smartphones, some recent reports would have raised alarm bells.

The famous cybersecurity company Kaspersky revealed that applications containing malware would have been installed 600 million times on Android smartphones this year. The question is therefore legitimate: how can something like this happen if Google is taking care of scanning every content before downloading?

Google Play thinks of new security solutions: here’s how malware gets past scanning

It all starts from a simple advert regarding any application within the Play Store. Whether it is useful software for editing videos, for implementing the default calculator or perhaps useful for other features, the application can be modified. Everything will happen at a later time.

This is precisely the key: a few weeks after users download specific content, the developer can release an update. This could make the application, previously harmless from every point of view, capable of completely transforming itself.

The developer will be able to add permissions and gods codes necessary for example to steal the passwords that the user uses for his banking applications.

In this regard, Google would have created a new user interface for the Play Store. This will be used to verify the user’s identity or the payment method used for purchases within the apps. This information can be used to prevent users from accidentally installing applications that contain malware in the future.

There will therefore be the possibility to verify all purchases made within the Google Play Store using your own, for example biometric data. Users will also be able to set other authentication preferences by controlling applications and protecting every purchase they make.

Leave a Reply

Your email address will not be published. Required fields are marked *