Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google to Flag Apps on Play Store that Use Excessive Amount of battery

Google to Flag Apps on Play Store that Use Excessive Amount of battery

Posted on November 18, 2025November 18, 2025 By CWS

Google is taking a big step to enhance cell person expertise by introducing new instruments to establish and flag apps that drain battery excessively.

Beginning March 1, 2026, purposes that fail to fulfill battery effectivity requirements may lose visibility on the Play Retailer and obtain warning labels.

The tech big has launched a brand new core vitals metric, “extreme partial wake locks,” as a part of its Android vitals program. This metric measures how lengthy apps forestall gadgets from getting into sleep mode, a main reason behind battery drain.

Google Flag Apps on the Play Retailer

The corporate defines extreme utilization as periods through which apps maintain greater than two cumulative hours of non-exempt wake locks inside 24 hours.

If an app exceeds this restrict in 5% of person periods inside 28 days, will probably be flagged. This initiative represents a collaborative effort between Google and Samsung, combining real-world person expertise information with Android platform insights.

Samsung’s deep information of battery consumption patterns helped refine the algorithm to be extra correct and consultant of precise person wants.

Android Builders presently have till March 1, 2026, to deal with battery drain points earlier than going through penalties.

Customers may even see a warning in your retailer 

Apps that don’t observe the foundations could also be faraway from outstanding locations the place customers can simply discover them, similar to suggestions or personalised ideas.

In some circumstances, Google could show warning messages on app retailer listings that inform customers the appliance could trigger extreme battery drain. To assist builders repair issues, Google is offering a number of sources.

The Android vitals dashboard now consists of an enhanced wake lock names desk that breaks down periods by particular tag names and durations.

This detailed breakdown permits builders to establish lengthy wake locks of their growth atmosphere and debug points extra successfully.

This new rule is added to different important high quality guidelines that Google Play expects all apps to observe, similar to preserving crash charges low and avoiding “App Not Responding” (ANR) points.

This complete strategy goals to make sure constant high quality throughout the whole Android ecosystem. Google emphasised that Android builders ought to overview their apps’ efficiency instantly and seek the advice of technical documentation, weblog posts, and movies to know greatest practices for decreasing wake lock utilization.

The corporate is dedicated to serving to builders construct environment friendly, steady purposes that present wonderful person experiences whereas preserving system battery life.

This initiative displays rising person frustration with battery drain and demonstrates Google’s dedication to implementing efficiency requirements on its platform.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Amount, Apps, battery, Excessive, Flag, Google, Play, Store

Post navigation

Previous Post: Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data
Next Post: SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026

Related Posts

Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Cyber Security News
Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Cyber Security News
Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics Cyber Security News
SnakeKeylogger via Weaponized E-mails Leverage PowerShell to Exfiltrate Sensitive Data SnakeKeylogger via Weaponized E-mails Leverage PowerShell to Exfiltrate Sensitive Data Cyber Security News
Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations Cyber Security News
BlindEagle Hackers Attacking Government Agencies with Powershell Scripts BlindEagle Hackers Attacking Government Agencies with Powershell Scripts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News