Jump to content

Search the Community

Showing results for tags 'google play'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions


  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 14 results

  1. Malicious apps on Google Play dropped banking Trojans on user devices The utility apps contained a previously-unknown dropper for financial malware. Google has removed 10 apps from the Play Store which contained droppers for financial Trojans. On Tuesday, Check Point Research (CPR) said in a blog post that the Android applications appear to have been submitted by the same threat actor who created new developer accounts for each app. The dropper was loaded into otherwise innocent-looking software and each of the 10 apps were utilities, including
  2. Barcode Scanner app on Google Play infects 10 million users with one update Late last December we started getting a distress call from our forum patrons. Patrons were experiencing ads that were opening via their default browser out of nowhere. The odd part is none of them had recently installed any apps, and the apps they had installed came from the Google Play store. Then one patron, who goes by username Anon00, discovered that it was coming from a long-time installed app, Barcode Scanner. An app that has 10,000,000+ installs from Google Play! We quickly added the detection, and G
  3. Google has once again shifted its target API level requirement for all apps submitted to Google Play. Since August 3, 2020, all new apps submitted to Google Play were required to target at least Android 10. Starting today, all updates to existing apps must target Android 10 (API level 29) or higher. The search giant made similar changes at the end of last year and has been requiring Android app developers to target newer API levels since 2017. Since its stable release in September of 2019, Android 10’s distribution has grown steadily, with the operating system running
  4. Tinder is exploring a different approach to fighting app store fees -- it's simply ignoring what the store operators want. The dating giant has introduced a default payment process into its Android app that skips Google Play's system entirely, instead taking payments directly. And if you go this route, you lose the option of switching back to Google Play after the fact. Match Group spokeswoman Justine Sacco characterized this as an experiment to Bloomberg, saying that the firm "constantly" tests new features
  5. Across six apps, the spyware managed to spread to 196 different countries. An Android spyware dubbed MobSTSPY has managed to ride trojanized apps to a widespread, global distribution, mainly via Google Play. The malware masquerades as a legitimate application purporting to be things like flashlights, games and work productivity tools. While it’s not uncommon to come across weaponized fare in third-party app stores, MobSTSPY is notable for having managed to also infiltrate Google Play with at least six different apps over the course o
  6. Be careful what you're downloading from Google Play. Especially if it's one of 13 apps posing as driving games created by one developer called Luiz Pinto. More than 560,000 have already been tricked into downloading the games, which include a mix of luxury car and truck simulation apps, as discovered by Android malware researcher Lukas Stefanko. Once installed on a user's Android device, the games don't actually work. Looking at the reviews on Google Play, users who downloaded them complained it was a virus. For instance, among the masses of one-star reviews for th
  7. A new type of Android-centric spyware has been found that is capable of avoiding Google’s app-vetting process. Malicious actors have placed the spyware in an app, called Radio Balouch, aka RB Music, which does in fact deliver on its advertised promise of playing Balouchi-style music, a traditional music that encompasses classical, semi-classical, and folk music originating from the region of southwest Pakistan, southeast Iran, and southwest Afghanistan. However, in addition to delivering the music the app steals the users personal information, E
  8. The heavily obfuscated adware was found in 238 different apps on Google Play. Consumers and enterprise customers expect the apps they download from Google Play, Apple's App Store, and other officially sanctioned app repositories to be secure and have at least minimal respect for privacy. But security researchers at Lookout found 238 applications in Google Play that hid BeiTaAd, a well-obfuscated ad plugin that could display ads on the device's lock screen, trigger video and audio advertisements even while the phone is asleep, and display ads outside the app that interf
  9. Epic details technical, security hurdles of "indie" mobile launch In bringing Fortnite to Android this summer, Epic gambled that the biggest video game phenomenon in the world could find success without relying on the centralized Google Play storefront (and its 30 percent cut of all revenues). That gamble seems to have paid off so far—Epic reports 15 million Fortnite downloads and 23 million players on Android just 21 days after the game's beta release. For context, the iOS version of the game saw roughly 11 million installations in its first month, accordin
  10. Security is an important factor when it comes to technology, and in most cases you can never have too much. In 2014, our smartphones know more about us than we know about ourselves, and if malware were to creep onto our smartphones then we could potentially suffer some major consequences. As a result, like any reasonable person, we would look to secure our device. This is what Deviant Solutions, the creator of the current #1 Play Store app, decided to capitalize on. No, ZERO! Virus Shield claims it is an antivirus that "protects you and your personal information from harmful viruses, malware,
  11. Chinese-made drone app in Google Play spooks security researchers DJI Go 4, installed more than 1 million times, can execute arbitrary code. Enlarge / A DJI Phantom 4 quadcopter drone. Andri Koolme 82 with 64 posters participating The Android version of DJI Go 4—an app that lets users control drones—has until recently been covertly collecting sensitive user data and can download and execute code of the developers’ choice, researchers said in two reports that question the security and trustworthiness of a program
  12. Opinion: Google says there are no exceptions. Should Epic Games bite the bullet? After Fortnite launched on the Android mobile operating system, users were made aware that the installation process was somewhat unusual. Rather than visiting the Google Play Store and downloading the software directly, Epic Games employed a different installation technique known as sideloading, which requires the app to be downloaded from another source; in this case, Epic Games' website. Adding additional purchase or installation barriers to consumers in a market where easily-
  13. Apps spotted abusing use-after-free() bug seven months before patch At least three malicious apps with device-hijacking exploits have made it onto the Google Play Store in recent weeks. This is according to eggheads at Trend Micro, who found that the since-removed applications were all abusing a use-after-free() flaw in the operating system to elevate their privileges, and pull down and run further malware from a command-and-control server. The malicious apps were Camero, FileCrypt, and callCam, so check if you still have them installed. "The th
  14. Malicious phishing apps have once again made their way into the Google Play Store, this time imitating six online banks and a cryptocurrency exchange. ESET researchers spotted fake finance apps impersonating banks from New Zealand, Australia, the U.K., Switzerland and Poland, and the Austrian cryptocurrency exchange Bitpanda, according to a Sept. 19 blog post. The malicious apps imitated the Commonwealth Bank of Australia (CommBank) The Australia and New Zealand Banking Group Limited (ANZ), ASB Bank, TSB Bank, PostFinance, and Santander Bank Polska SA (forme
  • Create New...