Google Play Tests New Measures Against Fraudsters

Google, which started scanning Android applications while opening them last year, has now started testing its advanced financial fraud prevention system.

According to the statement made by Google PlayProtect after this “When the user tries to install the application from a source that downloads from the Internet (web browsers, messaging applications or file managers), financial fraud for the purpose of It will analyze and automatically block the installation of frequently abusive applications.”

In the new system, Google tracks the permissions of applications in real time. The system is particularly RECIEVE_SMS (receive SMS), READ_SMS (read SMS), BIND_Notifications (Link notifications), and Tracks financial scam apps that request Accessibility permissions. According to information from Google, applications that leak data using this type of access 95 percent comes from external sources.

App permissions will be reviewed in real time

The new system, which can be used via Google Play services, will be available for the first time in the coming weeks. in singapore will begin to be tested. When a malicious application is used “APPLICATION by Play Protect blocked” warning will appear. Google on this screenThis application may access sensitive information. This may increase the risk of identity theft or financial fraud.” It will also provide an explanation.

Technology giant for testing the application Singapore Cyber ​​Security Agency He stated that he collaborated with the company and that the application was previously tested by the Singapore administration. It was stated that the results will be closely monitored, and the guides have also been updated. With the new update, information on how to take legal action when necessary to solve potential problems in applications has been added to the guides. Also, Play Protect’s real-time scanning feature has been India, Thailand, Singapore and BrazilIt was stated that 515 thousand new malicious applications were detected in .


source site-33