Google is quietly testing a ‘Panic Button’ for Android. This button works when the user accidentally opens a malware and the back button gets blocked. If you happen to install and open a malicious and press the ‘back’ button, again and again, the Panic Button feature will help you override the application and get back to Home screen.
The development is reported to come in the wake of recent targeted and mass-level malware and ransomware attacks. Malware like CopyCat and SpyDealer had also affected about 14 million Android devices.
How Does The Panic Button Work?
The ‘Panic Button’ feature is being silently added by Google because no official announcement has come from the company. This feature was reportedly discovered by XDA-Developers and Bleeping Computer.
Malware apps usually block the navigation buttons so you cannot close them and they can infect your phone. The panic button gets activated when you press the back button 4 times continuously. The Android system then overrides the malware application and directs you to Home Screen from where the application can be uninstalled.
What are Malware apps?
Malware is software which is designed to disrupt, damage, or gain authorized access to your device. This type of software can install unwanted apps or access and information stored on your device.
CopyCat malware is one such software. It is responsible for affecting over 14 million Android devices and rooting about 8 million of them. This malware was responsible for showing phishy advertisements and was capable of rooting Android devices as well as installing other apps on them.
Another popular malware was the SpyDealer, that was capable of extracting your contacts, call logs, messages, click photographs and more even from Social Media apps. This malware could infect only Android KitKat and lower devices.
With an added safety feature like the Panic Button, Android users can feel a little safer and be assured their data is secure. This is a welcome move from Google and shows the company is taking this situation seriously.