Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Posted on August 26, 2025August 26, 2025 By CWS

Aug 26, 2025Ravie LakshmananMobile Safety / Information Privateness
Google has introduced plans to start verifying the id of all builders who distribute apps on Android, even for individuals who distribute their software program outdoors the Play Retailer.
“Android would require all apps to be registered by verified builders with a view to be put in by customers on licensed Android gadgets,” the corporate mentioned. “This creates essential accountability, making it a lot tougher for malicious actors to shortly distribute one other dangerous app after we take the primary one down.”
To that finish, the tech big mentioned it intends to begin sending out invites progressively beginning October 2025, earlier than opening it as much as all builders in March 2026. The brand new necessities are anticipated to enter impact beginning a yr from now, in September 2026, in Brazil, Indonesia, Singapore, and Thailand.

“At this level, any app put in on a licensed Android system in these areas have to be registered by a verified developer,” Suzanne Frey, vice chairman of Product, Belief and Progress for Android, added.
It is price noting that nothing a lot will change for builders who distribute apps by means of the Google Play Retailer, as they’re prone to have already met these verification necessities by means of the prevailing Play Console course of. A separate kind of Android Developer Console account is within the works for pupil and hobbyist builders.
Google mentioned the modifications are designed to stop malicious actors from impersonating builders and utilizing their branding and repute to create convincing faux apps. Compounding the issue is the presence of such malicious apps which are distributed by way of third-party app marketplaces from the place customers can sideload them.
The developer verification mandate provides to already present safety measures that block the sideloading of probably harmful apps in markets like Singapore, Thailand, Brazil, and India.
In July 2023, the corporate additionally started requiring all new developer accounts registering as a corporation to supply a legitimate D-U-N-S quantity assigned by Dun & Bradstreet earlier than submitting apps in an effort to construct consumer belief.

The “new layer of safety,” Google identified, goals to guard customers from repeat unhealthy actors spreading malware and scams, in addition to present a “constant, frequent sense baseline of developer accountability” throughout Android. It additionally mentioned the system preserves consumer alternative whereas enhancing safety for everybody.
Whereas the Android app distribution guidelines are geared toward tightening the safety of the ecosystem, in addition they come at a time when Google is doubtlessly observing main reforms to the Play Retailer, together with distributing competing app shops by means of Google Play and offering rivals with entry to its full app catalog, after having a misplaced an antitrust lawsuit introduced by Epic Video games in 2020.

The Hacker News Tags:Android, Apps, Block, Countries, Developers, Google, Malicious, Verify

Post navigation

Previous Post: CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
Next Post: CISA Warns of Citrix RCE and Privilege Escalation Vulnerabilities Exploited in Attacks

Related Posts

GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The Hacker News
CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 The Hacker News
5 Reasons Why Attackers Are Phishing Over LinkedIn The Hacker News
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer The Hacker News
AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe The Hacker News
Why DNS Security Is Your First Defense Against Cyber Attacks? The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark