SlideShare una empresa de Scribd logo
1 de 2
Bouncer- Google’s unique way to prevent malware
The Bouncer service of Android provides automatic scanning of Android market for malicious
software without disrupting the user experience. The features are being discussed in this article.

Google has always retained that the Android market is never affected by Malware, even though it
is not immune to it. Recently, it was found out that a technology called ‘Bouncer’ was used to
monitor Android apps for malware. A bouncer has the facility to identify and remove the apps
that contains spyware, Trojans and malware.

Bouncer is a tool that automatically scans the applications on the Android App Store/Android
Market and in the developer accounts. It constantly checks the apps and removes the application
immediately if it finds anything that can potentially harm the users or anything that seems top be
suspicious.

As noted by Google, from the time a Bouncer is operating, the malware levels have gone down.
Google also claimed that since the second half of the last year, there has been a deduction of
40% in the malicious downloads.

New features and innovations added by Android platform for the purpose of security of
applications -

Addition of latest android security layer:

 Bouncer – a new service developed by Google gives automated scanning of Android market for
malicious software. There are some services which perform a set of analysis on new applications
which are present in the Android market and developer accounts. Usually when an application is
uploaded, the service gets a chance to analyze it for the known spyware, malware and Trojans.
There is a process by which we can run all the apps on Google’s cloud infrastructure and also
simulate that how it will run on an Android gadget to look for malicious behavior.

Decrease in the Android malware downloads:

There has been 40% decrease in the number of potentially malicious downloads from the
Android market. This drop is actually seen at the time when anti-malware and security software
selling companies claim that malicious applications are on rise.
Less potency factor:

In order to use new services to avoid malware, Android was designed from the start to make the
mobile malware less troublesome. As far as PC model is concerned, malware has got a lot of
possibility to misuse your information. Following are the core security features of Android:

      Sand boxing: There is a technique called ‘sandboxing’ on the Android platform which
       puts virtual walls between application and other software. Hence, in case you download a
       malicious application, it can’t access to the data on other parts of your phone.
      Removing the malware: Android has been designed in a way that malware can be
       removed easily from your device if it is affecting your device... In Android market, there
       is a possibility of remotely removing the malware out of the tablet or phone, if required.
      Permissions: A Permission system provided by Android is for helping the users
       understand the capabilities of the apps that are installed by you and then manage your
       own preferences.

Looking at the features of Android for Security, we can say that Android is getting day by day in
detecting and eliminating malware.

We have experienced team of Android application developers for delivering ideal Android based
solutions. You can contact us at info@softwebsolutions.com if you have a customized requirement
of Android application development.

Más contenido relacionado

Destacado

2月22日は行政書士記念日です。
2月22日は行政書士記念日です。2月22日は行政書士記念日です。
2月22日は行政書士記念日です。
Yasuko Tanaka
 
Filmötlet pályázat
Filmötlet pályázatFilmötlet pályázat
Filmötlet pályázat
cbh7nxaa
 
Handbuch Mediaoptimizer 3.7.0
Handbuch Mediaoptimizer 3.7.0Handbuch Mediaoptimizer 3.7.0
Handbuch Mediaoptimizer 3.7.0
guest0a9bd0
 

Destacado (10)

Insilvis Contemporary Space
Insilvis Contemporary SpaceInsilvis Contemporary Space
Insilvis Contemporary Space
 
1080
10801080
1080
 
Presentación Allo Marketing Research
Presentación Allo Marketing ResearchPresentación Allo Marketing Research
Presentación Allo Marketing Research
 
Karan chanana
Karan chananaKaran chanana
Karan chanana
 
YP-Q1 Bilder
YP-Q1 BilderYP-Q1 Bilder
YP-Q1 Bilder
 
2月22日は行政書士記念日です。
2月22日は行政書士記念日です。2月22日は行政書士記念日です。
2月22日は行政書士記念日です。
 
કૈલાશ માનસરોવર યાત્રા વાયા હેલીકોપ્ટર
કૈલાશ માનસરોવર યાત્રા વાયા હેલીકોપ્ટરકૈલાશ માનસરોવર યાત્રા વાયા હેલીકોપ્ટર
કૈલાશ માનસરોવર યાત્રા વાયા હેલીકોપ્ટર
 
YP-S3 Vorschau
YP-S3 VorschauYP-S3 Vorschau
YP-S3 Vorschau
 
Filmötlet pályázat
Filmötlet pályázatFilmötlet pályázat
Filmötlet pályázat
 
Handbuch Mediaoptimizer 3.7.0
Handbuch Mediaoptimizer 3.7.0Handbuch Mediaoptimizer 3.7.0
Handbuch Mediaoptimizer 3.7.0
 

Más de Softweb Solutions

Noti-fi Android App at Softweb Hackthon 2014
Noti-fi Android App at Softweb Hackthon 2014Noti-fi Android App at Softweb Hackthon 2014
Noti-fi Android App at Softweb Hackthon 2014
Softweb Solutions
 

Más de Softweb Solutions (20)

Sitecore 9 Pre-Migration Assessment
Sitecore 9 Pre-Migration AssessmentSitecore 9 Pre-Migration Assessment
Sitecore 9 Pre-Migration Assessment
 
Enterprise Sales App with Salesforce Integration - Softweb Solutions
Enterprise Sales App with Salesforce Integration - Softweb SolutionsEnterprise Sales App with Salesforce Integration - Softweb Solutions
Enterprise Sales App with Salesforce Integration - Softweb Solutions
 
How Salesforce FSL is redefining field service operations
How Salesforce FSL is redefining field service operationsHow Salesforce FSL is redefining field service operations
How Salesforce FSL is redefining field service operations
 
Salesforce integration with ERP
Salesforce integration with ERPSalesforce integration with ERP
Salesforce integration with ERP
 
A complete Salesforce implementation guide on how to implement Salesforce
A complete Salesforce implementation guide on how to implement SalesforceA complete Salesforce implementation guide on how to implement Salesforce
A complete Salesforce implementation guide on how to implement Salesforce
 
How cognitive services can be used in various industries
How cognitive services can be used in various industriesHow cognitive services can be used in various industries
How cognitive services can be used in various industries
 
5 jobs where bots will replace humans
5 jobs where bots will replace humans5 jobs where bots will replace humans
5 jobs where bots will replace humans
 
How Amazon Echo can be helpful for the healthcare industry
How Amazon Echo can be helpful for the healthcare industryHow Amazon Echo can be helpful for the healthcare industry
How Amazon Echo can be helpful for the healthcare industry
 
Top 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform providerTop 8 questions to ask to an IoT platform provider
Top 8 questions to ask to an IoT platform provider
 
Deep Dive into Service Design
Deep Dive into Service DesignDeep Dive into Service Design
Deep Dive into Service Design
 
Leverage IoT to Setup Smart Manufacturing Solutions
Leverage IoT to Setup Smart Manufacturing SolutionsLeverage IoT to Setup Smart Manufacturing Solutions
Leverage IoT to Setup Smart Manufacturing Solutions
 
Big Data in Action : Operations, Analytics and more
Big Data in Action : Operations, Analytics and moreBig Data in Action : Operations, Analytics and more
Big Data in Action : Operations, Analytics and more
 
Sensors, Wearables and Internet of Things - The Dawn of the Smart Era
Sensors, Wearables and Internet of Things - The Dawn of the Smart EraSensors, Wearables and Internet of Things - The Dawn of the Smart Era
Sensors, Wearables and Internet of Things - The Dawn of the Smart Era
 
Secure and scalable motioning solution with aws
Secure and scalable motioning solution with awsSecure and scalable motioning solution with aws
Secure and scalable motioning solution with aws
 
How enterprise can benefit from internet of things
How enterprise can benefit from internet of thingsHow enterprise can benefit from internet of things
How enterprise can benefit from internet of things
 
Enterprise Mobility Solutions for Manufacturing Industry
Enterprise Mobility Solutions for Manufacturing IndustryEnterprise Mobility Solutions for Manufacturing Industry
Enterprise Mobility Solutions for Manufacturing Industry
 
Noti-fi Android App at Softweb Hackthon 2014
Noti-fi Android App at Softweb Hackthon 2014Noti-fi Android App at Softweb Hackthon 2014
Noti-fi Android App at Softweb Hackthon 2014
 
Song Sharing with Nodejs - Softweb Hackathon 2014
Song Sharing with Nodejs - Softweb Hackathon 2014Song Sharing with Nodejs - Softweb Hackathon 2014
Song Sharing with Nodejs - Softweb Hackathon 2014
 
Tracking Application - Softweb Hackathon 2014
Tracking Application - Softweb Hackathon 2014Tracking Application - Softweb Hackathon 2014
Tracking Application - Softweb Hackathon 2014
 
Beacon applications - Softweb Hackathon 2014
Beacon applications - Softweb Hackathon 2014Beacon applications - Softweb Hackathon 2014
Beacon applications - Softweb Hackathon 2014
 

Último

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Último (20)

ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Bouncer- Google’s unique way to prevent malware

  • 1. Bouncer- Google’s unique way to prevent malware The Bouncer service of Android provides automatic scanning of Android market for malicious software without disrupting the user experience. The features are being discussed in this article. Google has always retained that the Android market is never affected by Malware, even though it is not immune to it. Recently, it was found out that a technology called ‘Bouncer’ was used to monitor Android apps for malware. A bouncer has the facility to identify and remove the apps that contains spyware, Trojans and malware. Bouncer is a tool that automatically scans the applications on the Android App Store/Android Market and in the developer accounts. It constantly checks the apps and removes the application immediately if it finds anything that can potentially harm the users or anything that seems top be suspicious. As noted by Google, from the time a Bouncer is operating, the malware levels have gone down. Google also claimed that since the second half of the last year, there has been a deduction of 40% in the malicious downloads. New features and innovations added by Android platform for the purpose of security of applications - Addition of latest android security layer: Bouncer – a new service developed by Google gives automated scanning of Android market for malicious software. There are some services which perform a set of analysis on new applications which are present in the Android market and developer accounts. Usually when an application is uploaded, the service gets a chance to analyze it for the known spyware, malware and Trojans. There is a process by which we can run all the apps on Google’s cloud infrastructure and also simulate that how it will run on an Android gadget to look for malicious behavior. Decrease in the Android malware downloads: There has been 40% decrease in the number of potentially malicious downloads from the Android market. This drop is actually seen at the time when anti-malware and security software selling companies claim that malicious applications are on rise.
  • 2. Less potency factor: In order to use new services to avoid malware, Android was designed from the start to make the mobile malware less troublesome. As far as PC model is concerned, malware has got a lot of possibility to misuse your information. Following are the core security features of Android:  Sand boxing: There is a technique called ‘sandboxing’ on the Android platform which puts virtual walls between application and other software. Hence, in case you download a malicious application, it can’t access to the data on other parts of your phone.  Removing the malware: Android has been designed in a way that malware can be removed easily from your device if it is affecting your device... In Android market, there is a possibility of remotely removing the malware out of the tablet or phone, if required.  Permissions: A Permission system provided by Android is for helping the users understand the capabilities of the apps that are installed by you and then manage your own preferences. Looking at the features of Android for Security, we can say that Android is getting day by day in detecting and eliminating malware. We have experienced team of Android application developers for delivering ideal Android based solutions. You can contact us at info@softwebsolutions.com if you have a customized requirement of Android application development.