Google using custom malware scanner for Android apps

Google has been using a home-grown tool to scan mobile applications as a way to prevent its Android Market from becoming fertile ground for malware spread, the tech giant announced Thursday.

Known as "Bouncer," the service studies new and existing applications, looking for anomalies that could signal a program that is up to no good.

"We actually run every application on Google's cloud infrastructure and simulate how it will run on an Android device to look for hidden, malicious behavior," Hiroshi Lockheimer, Android's vice president of engineering, wrote in a post on the Google Mobile Blog. "We also analyze new developer accounts to help prevent malicious and repeat-offending developers from coming back."

Lockheimer credited Bouncer with lowering the number of "potentially" malicious downloads in the Android Market by 40 percent, between the first and second half of 2011. It is unclear why Google waited so long to announce the new service.

He admitted that Google's findings run counter to what many security firms have been saying, including a recent report from Juniper Networks, which found that malicious Android samples have spiked 472 percent since July, And a 2012 prediction report from Lookout Mobile Security, which makes Android security products, said more than $1 million was stolen from Android users last year due to mobile threats, and that the annual malware-encounter rate has increased to four percent.

In November, a Google engineer, in a personal blog post, shrugged off suggestions that the Android operating system wasn't secure.

More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.