Google ramps up fight against bad apps with tightened Android security
A small number of people could see warnings with the new system, Google said
IDG News Service - Google is boosting Android security safeguards to better detect potentially harmful apps throughout their life cycle.
The security enhancement, announced Thursday, is designed to continually check Android devices to detect vulnerabilities in apps that could be introduced at any time. Previously, malicious apps downloaded outside of Google Play could only be flagged at the time of installation.
Such apps, if not detected, could expose personal information, incur unwanted usage charges, or damage the Android device.
The enhancement is built on Android's app scanning system, which was rolled out two years ago to analyze apps for malware, spyware and Trojans.
"We're adding to that service layer, further fortifying your Android phone or tablet," the company said.
The update is available on devices running Android 2.3 or later, and began rolling out Thursday. Users do not have to take action to receive the update.
Because potentially harmful applications are rare, most people will not see any warnings or other indications that they have the additional layer of protection, Google said. The Verify Apps service has been used more than 4 billion times in the last year to check apps at the time of installation. In that time, only 0.18 percent of installations received a warning that the app was potentially harmful, Google said.
But, "we do expect a small number of people to see warnings as a result of this new capability," the company said. "Even though the risk is minuscule, we're committed to making sure that the best available security protections are available to all Android users," Google said.
Android has other safeguards built into its platform, such as application sandboxing, which is designed to reduce harmful apps' ability to damage devices.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts