Feeds

Google's whack-a-mole Marketplace cleans house again

Rovio Mobile, not Rovio MobiIe

Top 5 reasons to deploy VMware with Tegile

Google's reactive policy over content on the Android Marketplace saw dozens of applications popping up overnight with names close enough to the real thing to reel in a mark or two.

The worst offender has to be "Rovio MobiIe", which simply replaced the "L" with a capital "I" to make its products indistinguishable from those emanating from the Angry Birds developer. That enabled the company to push out more than a dozen malware-laden apps, spotted by Android Police and removed by Google three hours later:

Applications uploaded to the Android Marketplace under a false name

They've all disappeared now – Google moves fast enough once alerted

How many people downloaded the apps – and compromised their handsets – in the intervening time we don't know.

Google's approach to Android Apps, YouTube videos and just about everything else is reactive; nothing is done until a complaint is received. That sounds reasonable, but means that someone has to suffer enough to complain every time something is uploaded.

In this instance the chaps at Android Police lodged the complaint, but other apps the site considers malware-masquerading-as-games are still listed in the store, and require run-at-boot permissions when installed.

Much of the malware now requires users to submit a five-star rating before it will run. But most users just click "OK" like they usually do, so star rating can't be considered an easy guide: users should be reading the reviews, and the permissions, before installing anything.

Sadly not many users can be bothered to do that, as has been shown time and time again, but the only alternative would seem to be Apple's draconian level of control, or perhaps going back to phones which just make phone calls. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.