Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Spotting Fake Apps on the Google Play Store

Tip of the Week: Spotting Fake Apps on the Google Play Store

Mobile devices have countless uses, all of which enable users to get the most out of them. But what if all of your efforts at finding the best applications for the job are wasted on finding a fraudulent app on the Google Play Store? Believe it or not, the Google Play Store has its fair share of malware available for download in all types of disguises. Here are a few tips to help you avoid installing them in the first place.

You might be wondering how it’s even possible that Google’s quality control manages to miss so many of these apps. Here’s how.

How These Apps Make it to the Play Store
It’s clear that Google understands just how important security is, so it’s a bit concerning that malware can find its way to the Play Store. Still, this doesn’t mean that it’s easy for threats to do so, as hackers still have to meet Google’s standards in order to post their content on it. Malware developers, however, have found ways to sneak their apps past the automated security that Google implements. They do this by uploading an app that initially has no malicious intent, and can therefore circumvent the security of the Play Store. Once the app has been downloaded, it reaches out to a third-party server that then proceeds to install malware directly to the device. This is the process that many malicious applications use to sneak past Google’s security.

How to Spot the Fakes
Google has taken a stand against malicious and fraudulent apps on the Play Store, but measures like Google Play Protect aren’t nearly enough. Vigilance is one of the best ways to keep your business secure from fake apps. If you ever find yourself needing to install an app in the future, be sure to check this list to make sure that the app is actually legitimate first.

  • Name, description, and other details: The first sign that an app isn’t legitimate will be its name or description. Malicious applications have traditionally tried to replicate original applications as often as they can, laughing in the face of Google Play’s impersonation policy. Sometimes these apps aren’t caught and pulled immediately, so you have to be extra careful to read the description. Often times, impersonated apps will have descriptions written in broken English. This is why the description is the best indicator that an application is legitimate.
  • Check the reviews: The Google Play Store lets users leave reviews, and you can use these reviews as a way to identify dangerous applications. However, a fake application could also be subject to fake reviews, which might make it difficult to identify the good from the bad. Either way, any negative reviews might give you the chance to reconsider your choice to download the app anyway, so if it’s a bad apple in the barrel, you’ll be saving yourself some stress anyway./
  • The Developer: Is the app really from the developer that it claims to be from? If it’s a well-known application, you should be able to tell who developed it, but you might need to put on the brakes and take a closer look before downloading a business application. If it’s from an unknown developer with no history, think twice before downloading it.
  • Number of downloads: How popular is the app that you want to download? If it’s been downloaded billions of times, it’s probably more legitimate than one with hundreds, thousands, or even millions of downloads.

How many fake apps have you come across on Google Play or the Amazon App Store? Let us know in the comments, and be sure to subscribe for more technology tips and tricks.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Internet Malware Software Network Security Google Business Management Microsoft Windows 10 Computer Hosted Solutions Innovation User Tips Backup Productivity Productivity Business Windows Apps Email Efficiency Cybercrime Cybersecurity Hardware Mobile Devices Smartphone Operating System Virtualization Law Enforcement Disaster Recovery Browser Data Security Ransomware Android Managed IT Services Small Business Business Continuity IT Support VoIP Telephone Systems Mobile Device Management Data Backup Money Miscellaneous Passwords Mobility Holiday Server Office 365 Smartphones Microsoft Office Quick Tips communications Phishing Chrome Internet of Things Information Technology App Government Cloud Computing Unsupported Software Google Drive Outsourced IT Tech Term Application Saving Money Data Recovery Update Wireless Communication Collaboration Vulnerability Password IT Services Best Practice Risk Management Workplace Tips Social Gadgets Health Wi-Fi Alert Social Media Managed Service Provider Antivirus Upgrade Data Management IT Support Politics Managed IT Two-factor Authentication Facebook Data Current Events Spam Windows 10 Computers BDR Shortcut Hacking Identity Theft Save Money User Error Work/Life Balance Office tips USB Artificial Intelligence Meetings Legal Mobile Security Search The Internet of Things Google Docs Hosted Solution Flexibility Office Blockchain Network DDoS Mobile Computing Cleaning History Data Protection End of Support Private Cloud Battery Sports HaaS Save Time Recovery Cost Management Automation Commerce Personal Information Tech Support Cortana Automobile Transportation Proactive IT Going Green Apple Internet Exlporer Wireless Technology Data Storage eWaste WiFi Fraud OneNote Encryption Samsung VPN Patch Management Streaming Media Social Engineering Bandwidth Humor Telephony Managed IT Services Remote Computing Television Audit iPhone Excel Users Computer Care Employer-Employee Relationship Safety Workers Emails Sync WannaCry Data Loss IT budget Conferencing Updates Webinar Virtual Reality Identity Gifts HBO Entertainment Router Data storage Microsoft Word IT solutions Adobe Trending Nanotechnology Microsoft Excel Lithium-ion battery Scalability Scam Education Identities Administrator Data Privacy Credit Cards Mobile Device Distributed Denial of Service Bluetooth Maintenance Windows 10s Applications Language Root Cause Analysis File Sharing How To Employer Employee Relationship Marketing Access IT Management Experience Fax Server Licensing Device Security Solid State Drive Augmented Reality Storage Computer Accessories Point of Sale FAQ SaaS IT Solutions Advertising Phone System Hard Disk Drive Travel Gmail Hacker Devices Virus Wearable Technology Reputation Files Music Charger Unified Threat Management Tablets Keyboard Laptop Spyware Proactive Legislation Black Market Vendor Management Analytics Robot Wireless Charging Upgrades WIndows Server 2008 NFL Touchpad Websites Comparison Running Cable PDF Big Data SharePoint Screen Mirroring Data Breach Consultant iOS Word Hiring/Firing Edge Data Theft Specifications Instant Messaging Training Worker Commute Text Messaging Books Evernote Touchscreen Outlook Windows Ink Benefits Operating Sysytem Uninterrupted Power Supply Ciminal Budget Computing Settings Sales Managing Stress Company Culture Cast Electronic Medical Records Teamwork Networking Computer Fan Google Maps Video Games Smart Technology Avoiding Downtime Project Management Chromecast App store Retail BYOD Remote Monitoring Emergency Monitors Disaster Worker Hard Drive CrashOverride Relocation Cache

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login