Google confirms Android dev verification will have free and paid tiers, no public list of devs

Google has officially announced that its Android developer verification process will include both free and paid tiers, marking a significant change in how developers are authenticated on the platform. This new system aims to enhance security and trustworthiness of apps available on the Google Play Store by ensuring that developers undergo a verification process. Unlike some expectations, Google will not maintain a public list of verified developers, focusing instead on internal verification to protect developer privacy and reduce potential abuse. The free tier will allow developers to verify their identity without cost, while the paid tier will offer additional benefits and assurances, potentially including faster processing and enhanced support. This move is part of Google's broader strategy to improve app ecosystem security and user trust, responding to ongoing concerns about malicious apps and developer impersonation. Developers and users alike can expect a more secure environment with clearer accountability, although some have expressed concerns about the lack of a public developer list, which could have aided transparency. Overall, Google's dual-tier verification system represents a balanced approach to security, privacy, and usability in the Android app marketplace.

This Cyber News was published on arstechnica.com. Publication date: Tue, 07 Oct 2025 01:14:03 +0000


Cyber News related to Google confirms Android dev verification will have free and paid tiers, no public list of devs

CVE-2025-38248 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Google confirms Android dev verification will have free and paid tiers, no public list of devs - Google has officially announced that its Android developer verification process will include both free and paid tiers, marking a significant change in how developers are authenticated on the platform. This new system aims to enhance security and ...
1 month ago Arstechnica.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
CVE-2024-57929 - In the Linux kernel, the following vulnerability has been resolved: dm array: fix releasing a faulty array block twice in dm_array_cursor_end When dm_bm_read_lock() fails due to locking or checksum errors, it releases the faulty block implicitly ...
9 months ago Tenable.com
What Is Android System WebView and Should You Uninstall It? | Definition from TechTarget - Android developers use WebView when they want to display webpages or Hypertext Markup Language content in a Google app or other application. Android System WebView is a system component for the Android operating system (OS) that enables Android apps ...
1 year ago Techtarget.com
Ahead of Regulatory Wave: Google's Pivotal Announcement for EU Users - Users in the European Union will be able to prevent Google services from sharing their data across different services if they do not wish to share their data. Google and five other large technology companies must comply with the EU's Digital Markets ...
1 year ago Cysecurity.news
Android 15, Google Play get new anti-malware and anti-fraud features - Today, Google announced new security features coming to Android 15 and Google Play that will help block scams, fraud, and malware apps on users' devices. Announced at Google I/O 2024, the new features are designed not only to help end users but also ...
1 year ago Bleepingcomputer.com
CVE-2023-52578 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Google Cloud Next 2024: New Data Center Chip Joins Ecosystem - Google Cloud announced a new enterprise subscription for Chrome and a bevy of generative AI add-ons for Google Workspace during the Cloud Next '24 conference, held in Las Vegas from April 9 - 11. Overall, Google Cloud is putting its Gemini generative ...
1 year ago Techrepublic.com
Google promises a rescue patch for Android 14's "ransomware" bug - So Android 14 has this pretty horrible storage bug for upgrading users. Bugs are always going to happen, but the big problem with this is that Google has seemingly been ignoring it, and on Friday we wrote about how users have been piling up hundreds ...
1 year ago Arstechnica.com
CVE-2023-52784 - In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. ...
1 year ago Tenable.com
AutoSpill attack steals credentials from Android password managers - Security researchers developed a new attack, which they named AutoSpill, to steal account credentials on Android during the autofill operation. In a presentation at the Black Hat Europe security conference, researchers from the International ...
1 year ago Bleepingcomputer.com
Google paid $10 million in bug bounty rewards last year - Google awarded $10 million to 632 researchers from 68 countries in 2023 for finding and responsibly reporting security flaws in the company's products and services. Though this is lower than the $12 million Google's Vulnerability Reward Program paid ...
1 year ago Bleepingcomputer.com Hunters
CVE-2023-53109 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2025-38066 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Google Workspace Marketplace: 4 Tips for Choosing the Best Apps - An Independent Security Verification badge is one indication that an app should go to the top of your list when evaluating options in the Google Workspace Marketplace. We may be compensated by vendors who appear on this page through methods such as ...
1 year ago Techrepublic.com Leviathan
CVE-2025-21700 - In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion Ackermann was able to create a UAF which can be abused for privilege escalation with the following ...
9 months ago Tenable.com
CVE-2021-47103 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Versions 14 and 13 of Android are Vulnerable to New Lock Screen Bypass Exploits - Using Android 14 and 13 smartphones, a newly discovered bug allowing the user to bypass the lock screen can compromise sensitive information from Google accounts stored in users' Google accounts, according to security researcher Jose Rodriguez. It ...
1 year ago Cysecurity.news
The Limitations of Google Play Integrity API - This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by Approov. Google provides app attestation ...
1 year ago Securityboulevard.com
Researchers Claim Design Flaw in Google Workspace Puts Organizations at Risk - Google is disputing a security vendor's report this week about an apparent design weakness in Google Workspace that puts users at risk of data theft and other potential security issues. According to Hunters Security, a flaw in Google Workspace's ...
1 year ago Darkreading.com Hunters
Google Silently Tracks Android Device Even No Apps Opened by User - The research examined cookies, identifiers, and other data stored on Android handsets by Google Play Services, the Google Play Store, and other pre-installed Google apps. When a user searches within the Google Play Store, “sponsored” ...
8 months ago Cybersecuritynews.com
Google: Malware abusing API is standard token theft, not an API issue - Google is downplaying reports of malware abusing an undocumented Google Chrome API to generate new authentication cookies when previously stolen ones have expired. In late November 2023, BleepingComputer reported on two information-stealing malware ...
1 year ago Bleepingcomputer.com
CVE-2025-39796 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
SpyLoan Android malware on Google Play downloaded 12 million times - More than a dozen malicious loan apps, which are generically named SpyLoan, have been downloaded more than 12 million times this year from Google Play but the count is much larger since they are also available on third-party stores and suspicious ...
1 year ago Bleepingcomputer.com Rocke

Cyber Trends (last 7 days)