Android devs must now provide personal details and use 2FA

Google sets out stricter requirements for Play Store developers to limit malicious apps uploaded to the Android marketplace

Developers uploading applications to Google’s Play Store for Android-powered devices must subscribe to two-factor authentication (2FA) and provide a number of personal details in a bid to improve security. 

When creating a new Google Play developer account, users will be required to supply an email address and a phone number, in addition to a contact name, physical address, and verification of personal contact information. 

Users will, in addition, be required to stipulate whether their account is personal or belongs to an organisation. This is optional for now but will be enforced for any account owners wanting to update their contact information. 

“Over the past few years, Google Play has seen tremendous growth,” said product manager at Google Play, Luke Jefferson and product manager at Google Play Trust and Safety, Raz Lev.

“Android apps and games have become a critical part of people’s lives, built by developers of all sizes from all over the world, whether professionally or just for fun.

“To keep Google Play safe and secure and to better serve our developer community, we are introducing two new security measures. 

“These measures will help strengthen your account security and will help us better understand your needs.”

From August, all new developer accounts will need to specify their account type and verify contact information at sign-up. Later this year, all existing developer account owners will be subject to these requirements.

Related Resource

Empowering the dynamic worker

How CIOs and IT teams can support a distributed workforce

Empowering the dynamic worker - words against a white background with a green clock - whitepaper from O2Download now

Google is also mandating that users of Google Play Console must sign in using 2FA, as an additional layer of protection.

The company is implementing these measures in order to drastically improve the cyber security hygiene of the Play Store, which has developed a notorious streak for inadvertently hosting several malicious applications at any one time.

Last year, for example, researchers identified thousands of instances of Mandrake spyware masquerading as legitimate apps on the Play Store, which all remained undetected for four years. Researchers also found six apps embedded with Joker fleeceware on the marketplace, with these apps boasting 200,000 installs.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021