Endpoint
8/12/2013
07:28 AM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Report: Google Play Store Infested With Adware

In study of 8,000 apps on Google Play, nearly 2,000 are flagged as adware, ZScaler says

The Google Play market, where most Android users go to safely download applications, is infested with adware, according to a study published last week.

In a blog posted Thursday, Zscaler posted the results of a study of 8,000 applications offered on Google Play. Of those 8,000 apps, more than 1,845 were flagged as adware, the blog states.

"This is a big number," the blog states. "Most of the applications were flagged by AV vendors due to their excessive inclusion of ads and deceptive practices for delivering them, including altering device settings."

The Zscaler blog suggests that there is a growing gap between Google's willingness to accept new applications that permit aggressive advertising techniques, and antivirus applications, which increasingly block applications that use such aggressive techniques.

"Ultimately, end users are stuck in the middle as they are left to decide if they will keep or delete the apps being flagged," the blog says.

Google's approach to adware differs from the approach that Apple takes, according to ZScaler.

"Google has clearly chosen to be very lenient with aggressive advertising practices, while Apple has taken the opposite approach," the blog states. "[Apple has]shown that they're willing to sacrifice advertising revenue to provide a positive user experience, even restricting the ability of advertisers to track device IDs and MAC addresses."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
iLoveOvy
50%
50%
iLoveOvy,
User Rank: Apprentice
8/20/2013 | 2:32:30 PM
re: Report: Google Play Store Infested With Adware
"Google's approach to adware differs from the approach that Apple takes, according to ZScaler."

Who owns almost all the advertisement on the web ? probably Google.

They make a bunch of money out of this, that's why they don't care.

Apple can't make profit out of it, that's why Apple Store is clean.

Simple logic here
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web