Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Posted on August 26, 2025August 26, 2025 By CWS

Aug 26, 2025Ravie LakshmananMobile Safety / Information Privateness
Google has introduced plans to start verifying the id of all builders who distribute apps on Android, even for individuals who distribute their software program outdoors the Play Retailer.
“Android would require all apps to be registered by verified builders with a view to be put in by customers on licensed Android gadgets,” the corporate mentioned. “This creates essential accountability, making it a lot tougher for malicious actors to shortly distribute one other dangerous app after we take the primary one down.”
To that finish, the tech big mentioned it intends to begin sending out invites progressively beginning October 2025, earlier than opening it as much as all builders in March 2026. The brand new necessities are anticipated to enter impact beginning a yr from now, in September 2026, in Brazil, Indonesia, Singapore, and Thailand.

“At this level, any app put in on a licensed Android system in these areas have to be registered by a verified developer,” Suzanne Frey, vice chairman of Product, Belief and Progress for Android, added.
It is price noting that nothing a lot will change for builders who distribute apps by means of the Google Play Retailer, as they’re prone to have already met these verification necessities by means of the prevailing Play Console course of. A separate kind of Android Developer Console account is within the works for pupil and hobbyist builders.
Google mentioned the modifications are designed to stop malicious actors from impersonating builders and utilizing their branding and repute to create convincing faux apps. Compounding the issue is the presence of such malicious apps which are distributed by way of third-party app marketplaces from the place customers can sideload them.
The developer verification mandate provides to already present safety measures that block the sideloading of probably harmful apps in markets like Singapore, Thailand, Brazil, and India.
In July 2023, the corporate additionally started requiring all new developer accounts registering as a corporation to supply a legitimate D-U-N-S quantity assigned by Dun & Bradstreet earlier than submitting apps in an effort to construct consumer belief.

The “new layer of safety,” Google identified, goals to guard customers from repeat unhealthy actors spreading malware and scams, in addition to present a “constant, frequent sense baseline of developer accountability” throughout Android. It additionally mentioned the system preserves consumer alternative whereas enhancing safety for everybody.
Whereas the Android app distribution guidelines are geared toward tightening the safety of the ecosystem, in addition they come at a time when Google is doubtlessly observing main reforms to the Play Retailer, together with distributing competing app shops by means of Google Play and offering rivals with entry to its full app catalog, after having a misplaced an antitrust lawsuit introduced by Epic Video games in 2020.

The Hacker News Tags:Android, Apps, Block, Countries, Developers, Google, Malicious, Verify

Post navigation

Previous Post: CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
Next Post: CISA Warns of Citrix RCE and Privilege Escalation Vulnerabilities Exploited in Attacks

Related Posts

Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features The Hacker News
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) The Hacker News
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately The Hacker News
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors The Hacker News
Google Fined 9 Million by French Regulator for Cookie Consent Violations Google Fined $379 Million by French Regulator for Cookie Consent Violations The Hacker News
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News