• Latest
  • All
  • How To
Protect Yourself from Downloading Malicious Apps with These Tips

Protect Yourself from Downloading Malicious Apps with These Tips

August 18, 2021
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
DHgate Tablet Cases deals
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Protect Yourself from Downloading Malicious Apps with These Tips

George Kamau by George Kamau
August 18, 2021
in Features
Reading Time: 5 mins read
264
9

Malicious apps have started showing up in official app stores either the Google Play store or the Apple App Store. These tips will help you see the danger signs from a mile away.

Our phones have become part and parcel of our identity and that makes gives them easier access to malicious actors via corrupted apps or genuine apps with bad intentions. When downloaded, the malicious app gets access to your most sensitive details – personal and financial info, photos and even conversations.

What’s scary is that even legitimate apps get bought by scrupulous companies who inject malicious code that allows tracking of users without their knowledge when they scroll through the app. The human behaviour is then copied to bots to generate fake traffic and steal advertisers revenue. These weird activities end up frustrating the users since the apps either drain the battery faster or deplete your data at a faster rate even when idle. Most Chinese apps exhibit this click injection and click flooding malpractices including CM Locker, Clean Master, Cheetah Keyboard, Security Master, CM launcher 3D, CM File Manager, Battery Doctor and Kika Keyboard.

As a smartphone user, you need to be really cautious about the apps you download:

Before Downloading

Use trustworthy app stores

Credible app stores like the Google Play Store or Apples App Store or Amazon will guarantee you some sort of safety even though some app companies have gamed them to avoid detection for malicious practices.

Take heed of the reviews the app has

Read what other users are saying about the app before downloading it. Some reviewers warn other users about the scam app but people still go ahead and download them. Worth also noting is apps that get great reviews from inauthentic users. Malicious app developers pay users to write these reviews.

Check the star ratings the app has gotten

Malicious apps will have a lower rating something like one or one half to two stars. The said apps will tend to also have bad reviews written about them. Be very wary when you also see apps that have unsynchronized star ratings and reviews. For example, apps that have been rated 5 stars but have terrible reviews. Stay away from those.

Run away from apps that are wildly over-permissioned

Carefully read through the permissions the app requires before downloading it. You can get them at the apps official page in the Play Store or App Store. I’d they are asking for way too many permissions than what the app requires, steer clear. Weather apps that require SMS and contact permissions are no-nono. Be cautious of apps that require to run in the background too either to launch other apps or control phone functions like messaging and control the keyboard. If they don’t require all these permissions to functions, run away from them.

Verify if its the real app

Malicious developers have mimicked names of genuine apps and games in the search algorithm so that if you’re searching for an app their malicious app comes first and you download it without a second thought. If you’re searching for a popular app and one with the wrong logo or a similar name and app icon but with few reviews or few star ratings, stay away from downloading it. If you go through the app’s description you will also find misspelt words or text that doesn’t make sense, don’t download it.

After Downloading

Stay away from apps that ask for additional unnecessary permissions

Some apps after downloading will ask you to grant them device admin access. You should really be careful before giving them this permission since after they’re granted, the apps make it hard to uninstall after they start exhibiting weird activities.

Remove apps that don’t do what they are supposed to do

Once you download an app and it starts showing strange behaviour when you open it and not what you downloaded it for, remove it immediately. Some of the apps seem to disappear from your home screen or app drawer after downloading. Watch out for them and if it doesn’t do its basic functions, delete it as soon as possible.

If they start draining the battery or deplete your bundles while not even running, delete them. Malicious apps can be made to run so that they use the phones resources including storage or battery or data to show ads even when not being used. Some of them even mine for cryptocurrency without the users’ knowledge. Just go to Settings> Battery> Battery Usage to see which apps are ruining your battery life.

With malicious apps getting their way into official app stores, it’s paramount for you to read between the lines to stay safe. Hopefully, these tips help you see the danger signs before harm comes your way.

Tech Habits to Adopt in 2021

Articles in this stream

Here’s how to protect your privacy and stay secure:

  • Facebook
  • Twitter
  • Instagram
  • WhatsApp
  • Signal
  • Google, Microsoft, Apple, Linkedin, Yahoo, and Amazon

Tags: Google Play Store
SendShare147Tweet92
George Kamau

George Kamau

I brunch on consumer tech | [email protected]

Related Posts

google-play-store

Google Play Store Sees 47% Decline in Apps After Major Purge

May 6, 2025
Good Lock app

Samsung’s Good Lock App Now Available Globally with One UI 7

April 15, 2025
Google Play Widget

Google Play Introduces Widget Badges and Search Filters

March 6, 2025
Google Play Store

How to Protect Yourself When Downloading Apps

April 9, 2024
Android figure

Google Will Enable Users to Remotely Uninstall Apps

November 8, 2023
Google Play Store

Google Removes 43 Malicious Apps from Play Store, Users Urged to Delete Infected Apps

August 22, 2023

Latest

Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

Starlink Is Expanding in Africa Through New Airtel Partnership

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.