Scams to avoid on Google, Apple and Android apps in general – Middle East & Gulf News



Hackers use interest in cryptocurrencies to lure people into promising them to earn big profits by investing money in cloud mining applications. These users end up installing malicious apps on their smartphones that contain harmful malware and adware.

google play

No less than 8 dangerous apps have been removed from the Google Play Store.

These apps tricked victims into watching ads, paying for subscription services that averaged $ 15 per month, and ramping up mining capabilities without getting anything in return.

Here is a list of the 8 malicious apps that Google removed from the Play Store:

  • BitFunds – Crypto Cloud Mining
  • Bitcoin Miner – Cloud Mining
  • Bitcoin (BTC) – Cloud wallet for pool mining
  • Crypto Holic – Bitcoin Cloud Mining
  • Daily Bitcoin Rewards – Cloud Based Mining System
  • Bitcoin 2021
  • MineBit Pro – Crypto Cloud Mining and btc miner
  • Ethereum (ETH) – Pool Mining Cloud

Trend Micro, a multinational cybersecurity software company, reported that more than 120 fake cryptocurrency mining apps are still available online and have affected more than 4,500 users worldwide from July 2020 to July 2021.

To recognize a fake crypto mining app, you need to:

1- Pay more attention to 1-star reviews.

2- Enter an invalid or wrong cryptocurrency wallet address. If the app accepts it, there is a high probability that the app is fraudulent.

3- Beware of low or no management fees for transferring cryptocurrency.

Apple Store

Apple claims that its App Store provides safety and security for users. However, unscrupulous apps continue to sneak onto the net.

One of the main drivers of these scams is the use of fake positive reviews. A common scam on the App Store is to build a very simple app that targets popular search keywords, put aggressive subscription prices on it, and drive it high in search results by faking hundreds of 5 star review on the App Store.

These bogus apps then push the paywall screens onto the users and prompt them to start a subscription plan. Bogus apps may offer free trial periods to make the sale look good and are written in reasonably good English. It is possible to see how they could bypass an automatic spam filter algorithm.

Other Apple Store scams

Customers of several VPN apps, which are supposed to protect user data, have complained in Apple App Store reviews that the apps tell users their devices have been infected with a virus to trick them into downloading and uploading. pay for software they didn’t need.

In another example, a QR code reader app that stays on the store prompts customers to pay $ 4.99 per week for a service that is now included in the iPhone’s camera app. Some apps also fraudulently present themselves as coming from big brands such as Amazon and Samsung.

Among the 1.8 million apps in the App Store, scams are lurking in plain sight. Of the 1,000 top-grossing apps on the App Store, nearly 2% are scams, according to Washington Post analysis.

And those apps have robbed consumers of around $ 48 million since they’ve been on the App Store, according to market research firm Appfigures.

Funny enough, Apple takes advantage of these apps because it takes up to 30% of all revenue generated through the App Store.

Apple says it is constantly improving its methods of detecting scams and usually catches them within a month of arriving on the App Store. In a recent press release, Apple said it had used new tools to verify the authenticity of user reviews and last year removed 470,000 app developer accounts from the App Store. Developers, however, can create new accounts and continue to distribute new apps.

Apple employs a 500-person app review team, which scrutinizes developer submissions.


Here are 9 popular but dangerous Android apps that can infect a mobile device, steal important files and passwords, and even bypass two-factor authentication.

1- Music players

Downloading a new music player can create unnecessary loopholes in the phone’s security for an app it already owns and invite Trojans.

2- obscure browsers

Stick to well-known browsers backed by companies held accountable to the public. Lesser-known browsers like UC Browser and Dolphin Browser have built in terrible tracking and privacy violation practices.

3- Free VPN

Free VPNs claim to put the user first, but they often have shady money-making practices like selling people’s data. Avoid free VPNs like SuperVPN and Pacific VPN.

4- Voice recorders

There is no need to tamper with the fire by installing an application unknown to a third party. QRecorder is another application that uses the AlienBot Trojan.

5- Cleaner applications

While there are some legitimate “cleaning” phone apps out there, most are scams that can do more harm than good. Magical Dev’s Super Clean, Cleanit, and Virus Cleaner have all been found to be dangerous.

6- Applications that claim to increase RAM

There is no way to increase the RAM of a phone. Any app that claims differently is definitely malware.

7- Unknown antivirus programs

Antivirus programs can be helpful, but the Play Store has been inundated with these apps. Stick to legitimate and well-known antivirus brands.

8- Disk Cleanup Apps

Phones do not have hard drives to defragment. The best these apps can do is delete other apps to free up space on the phone memory. And it’s something that people can do on their own.

9- lie detection apps

A phone cannot be used as a lie detector. Period.



Leave A Reply