Feeds

Google's whack-a-mole Marketplace cleans house again

Rovio Mobile, not Rovio MobiIe

Build a business case: developing custom apps

Google's reactive policy over content on the Android Marketplace saw dozens of applications popping up overnight with names close enough to the real thing to reel in a mark or two.

The worst offender has to be "Rovio MobiIe", which simply replaced the "L" with a capital "I" to make its products indistinguishable from those emanating from the Angry Birds developer. That enabled the company to push out more than a dozen malware-laden apps, spotted by Android Police and removed by Google three hours later:

Applications uploaded to the Android Marketplace under a false name

They've all disappeared now – Google moves fast enough once alerted

How many people downloaded the apps – and compromised their handsets – in the intervening time we don't know.

Google's approach to Android Apps, YouTube videos and just about everything else is reactive; nothing is done until a complaint is received. That sounds reasonable, but means that someone has to suffer enough to complain every time something is uploaded.

In this instance the chaps at Android Police lodged the complaint, but other apps the site considers malware-masquerading-as-games are still listed in the store, and require run-at-boot permissions when installed.

Much of the malware now requires users to submit a five-star rating before it will run. But most users just click "OK" like they usually do, so star rating can't be considered an easy guide: users should be reading the reviews, and the permissions, before installing anything.

Sadly not many users can be bothered to do that, as has been shown time and time again, but the only alternative would seem to be Apple's draconian level of control, or perhaps going back to phones which just make phone calls. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.