CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 20, 2026

Google slows Android sideloading to trip up scammers

Help Net Security Archived Mar 20, 2026 ✓ Full text saved

Google’s advanced flow for Android changes how apps from unverified developers are installed, adding steps to reduce scam-driven sideloading. The feature is aimed at experienced users and allows sideloading through a controlled, one-time setup. It addresses scam scenarios where attackers pressure individuals to install malicious software. In these cases, scammers often stay on the phone and guide victims step by step, pushing them to bypass security warnings and disable protections before they c

Full text archived locally
✦ AI Summary · Claude Sonnet


    Anamarija Pogorelec, Managing Editor, Help Net Security March 20, 2026 Share Google slows Android sideloading to trip up scammers Google’s advanced flow for Android changes how apps from unverified developers are installed, adding steps to reduce scam-driven sideloading. The feature is aimed at experienced users and allows sideloading through a controlled, one-time setup. It addresses scam scenarios where attackers pressure individuals to install malicious software. In these cases, scammers often stay on the phone and guide victims step by step, pushing them to bypass security warnings and disable protections before they can pause or seek help. The advanced flow adds delays and verification steps intended to disrupt coercive pressure and give users time to make decisions. Advanced flow for power users to sideload apps from unverified developers “We know a ‘one size fits all’ approach doesn’t work for our ecosystem. We want to ensure that identity verification isn’t a barrier to entry, so we’re providing different paths to fit specific needs,” Matthew Forsythe, Director Product Management, Android App Safety, explained. How the advanced flow works Start by enabling developer mode in system settings. This step requires deliberate action and reduces accidental triggers tied to scam tactics. The system then prompts a check to confirm that no one is guiding the process. This is intended to identify situations where a caller or message is influencing the user to disable protections. Next, restart the phone and reauthenticate. This step interrupts remote access or ongoing calls that could be used to monitor activity. After that, wait through a one-day delay before proceeding. Once the waiting period ends, confirm the action using biometric authentication or a device PIN. The delay slows decisions driven by urgency and allows time to reconsider. Once verification is complete, apps from unverified developers can be installed. Users can enable this access for a limited period, such as seven days, or leave it enabled without a set end. A warning appears to indicate the app’s source, with an option to continue the installation. More about Android application security Google scams software development Share
    💬 Team Notes
    Article Info
    Source
    Help Net Security
    Category
    ◇ Industry News & Leadership
    Published
    Mar 20, 2026
    Archived
    Mar 20, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗