According to Google, efforts are being made to prevent malicious apps from accessing Android smartphones, tablets, and other devices. In a blog post, Andrew Ahn, product manager on Google Play, said the Mountain View company would continue to improve the automated systems that help eliminate unscrupulous developers in the Google Play Store and improve the backend tools of its human moderators Identify malicious app content and behavior.
"Google Play is committed to providing billions of Android users with a safe and secure platform to discover and experience the apps they love and enjoy," Ahn wrote. "To meet this commitment, we worked to improve our abuse detection technologies and systems over the past year and significantly strengthened our team of product managers, engineers, policy experts and leaders in the fight against bad actors."
Google showed this in 201
In terms of privacy, Google wants to introduce additional policies on device permissions and user data throughout 2019, and also says it "improves" clustering and account matching technologies to identify "spammy" developer networks. Finally, Google claims to regularly perform "static" and "dynamic" analytics of inappropriate content apps, impersonators and PHAs, and to use "smart" using user intervention and feedback data to find "better accuracy and efficiency" bad apps ,
"Despite our improved and expanded defenses against bad apps, we know that bad actors will continue to try to escape our systems by changing their tactics and veiling bad behavior," Ahn wrote. "We will continue to develop our capabilities to counter such conflicting behaviors and work tirelessly to provide our users with a secure and secure app store."
News on Google's Android security initiatives comes after the Mountain View Company has announced that it has paid out $ 15 million since launching the Bug Bounty program in November 2010 – and after researchers from security company Eset and Trend Micro discovered malicious Android apps hosted in the Play Store that serve to run the To steal cryptocurrency and get users to download and install a trojan.