Google Play app developer guidelines overhauled

Search giant wants to clampdown on bad app behaviour, but security firm warns users to remain on their guard against malicious in-store content.

Android robot

End users should still tread with caution when downloading content from the Google Play store, despite the internet giant's recent clampdown on bad developer behaviour.

This is the view of Jovi Umawing, a research analyst at security vendor GFI Software, who has repeatedly flagged malicious apps and content on the Google Play store in the past.

As reported by IT Pro last week, one of the firm's most recent discoveries was a piece of malware disguised as a legitimate-looking Olympics 2012 app.

The buyer should always beware, and take note of the reviews and opinions from third party websites.

Google sent an email out to its community of app developers earlier this week, announcing that it had tightened up its Google Play Developer Programme Policies.

For instance, the firm is now restricting the use of app names and icons that are similar to existing ones, and clamping down on software that unlawfully discloses personal information.

The company has also introduced user guidelines that address the behaviour of adverts contained in apps.

"Ads in your app must follow the same rules as the app itself," stated the email. "Also, it is important to us that ads don't negatively affect the experience by deceiving consumers or using disruptive behavior such as obstructing access to apps and interfering with other ads."

The new guidelines will apply to new apps and updated ones, added Google, and developers that fail to comply could have their apps deleted.

"If you find any existing apps in your catalog that don't comply, we ask you to fix and republish the application within 30 calendar days of receiving this email," added Google.

In a statement to IT Pro, GFI's Umawing applauded Google's attempt to secure and clean up the Play store, but said more still needs to be done.

"The most significant part of the [new policy document] is the section that prohibits...sexually explicit content [from app adverts]," she said.

"This effectively bans certain types of advertising networks from being used in apps. If those are the networks primarily used by scammers to make money then they may well go elsewhere."

There is also a danger the changes Google has introduced may be misinterpreted by some users as an assurance that illegitimate apps will no longer feature in the store, Umawing warned.

"The buyer should always beware, and take note of the reviews and opinions from third party websites before installing any application," she added.

"It also pays to consult the Google Play Developer Program Policy when they need to, as this page outlines what apps they should download, steer clear from and report to Google for violation."

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021
What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021