Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Posted on August 26, 2025August 26, 2025 By CWS

Aug 26, 2025Ravie LakshmananMobile Safety / Information Privateness
Google has introduced plans to start verifying the id of all builders who distribute apps on Android, even for individuals who distribute their software program outdoors the Play Retailer.
“Android would require all apps to be registered by verified builders with a view to be put in by customers on licensed Android gadgets,” the corporate mentioned. “This creates essential accountability, making it a lot tougher for malicious actors to shortly distribute one other dangerous app after we take the primary one down.”
To that finish, the tech big mentioned it intends to begin sending out invites progressively beginning October 2025, earlier than opening it as much as all builders in March 2026. The brand new necessities are anticipated to enter impact beginning a yr from now, in September 2026, in Brazil, Indonesia, Singapore, and Thailand.

“At this level, any app put in on a licensed Android system in these areas have to be registered by a verified developer,” Suzanne Frey, vice chairman of Product, Belief and Progress for Android, added.
It is price noting that nothing a lot will change for builders who distribute apps by means of the Google Play Retailer, as they’re prone to have already met these verification necessities by means of the prevailing Play Console course of. A separate kind of Android Developer Console account is within the works for pupil and hobbyist builders.
Google mentioned the modifications are designed to stop malicious actors from impersonating builders and utilizing their branding and repute to create convincing faux apps. Compounding the issue is the presence of such malicious apps which are distributed by way of third-party app marketplaces from the place customers can sideload them.
The developer verification mandate provides to already present safety measures that block the sideloading of probably harmful apps in markets like Singapore, Thailand, Brazil, and India.
In July 2023, the corporate additionally started requiring all new developer accounts registering as a corporation to supply a legitimate D-U-N-S quantity assigned by Dun & Bradstreet earlier than submitting apps in an effort to construct consumer belief.

The “new layer of safety,” Google identified, goals to guard customers from repeat unhealthy actors spreading malware and scams, in addition to present a “constant, frequent sense baseline of developer accountability” throughout Android. It additionally mentioned the system preserves consumer alternative whereas enhancing safety for everybody.
Whereas the Android app distribution guidelines are geared toward tightening the safety of the ecosystem, in addition they come at a time when Google is doubtlessly observing main reforms to the Play Retailer, together with distributing competing app shops by means of Google Play and offering rivals with entry to its full app catalog, after having a misplaced an antitrust lawsuit introduced by Epic Video games in 2020.

The Hacker News Tags:Android, Apps, Block, Countries, Developers, Google, Malicious, Verify

Post navigation

Previous Post: CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
Next Post: Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof

Related Posts

Why DNS Security Is Your First Defense Against Cyber Attacks? The Hacker News
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat The Hacker News
A 24-Hour Timeline of a Modern Stealer Campaign The Hacker News
The Wild West of Shadow IT The Hacker News
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution The Hacker News
CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Organizations Warned of Exploited Git Vulnerability
  • Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
  • Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
  • CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
  • How to Understand Cyber Insurance Policies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Organizations Warned of Exploited Git Vulnerability
  • Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
  • Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
  • CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
  • How to Understand Cyber Insurance Policies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News