The application developer (developer) rogue malicious programs use to smuggle in their applications. Unfortunately, there is only the original Android users to download applications without staring it in advance whether the application contains malware or not. Moreover, if they download the application outside of Google’s Play.
Although somewhat difficult to detect the presence of malware or scam on Google Play, at least there are some easy ways you can do Android users to malicious programs do not slip on the device. Here’s how.
The first analysis detects a malware application and clean of scam, can be seen from the comments left.
If the same comment a lot but tend to fall apart or grammar, it is worth noting because it could be a scammer who did it or the developer himself a naughty comment on it.
It is no less important before downloading the application is to see who the developer of the application. If the application was released by the developers who already have a name, maybe you should not worry.
But if the developer was unfamiliar, you should visit the web site listed on that page.
Google Play provides the “Visit Developer’s” Website that take you to the official website of the developer. Make sure that you brought to the site on behalf of the developer.
If you find that you are taken to a site that is not valid, you can tell yourself that the developer is not responsible.
In early February 2012, there were no known developer who put the application on Google Instagram Play (first is called the Android Market). Of course this is not true Instagram, because the new Instagram available for Android at 3 April.
Application that quickly gets 5 star rating. Fortunately, Google quickly pulled the fake Instagram.
Therefore, be careful with new applications that can quickly direct rating 4 to 5 star. To be sure you have read the existing comments and make sure the reputation of the developer.
There are some applications that are asked for personal data when you have to install. If an application requested data location, this is not an indication of a malware or scam.
You must pay attention and should be wary if there is a simple application, but he asked for permission to access the browser history, GMail accounts, contacts, internet access, or the identity of the phone.
You may not allow an application to access personal data if it is relevant to the nature of the application with the requested data. However, if the request is not deemed relevant, you should not give permission.