Skip to main content

The reason behind the UC Browser's removal from Play Store

Update: November 17, 06:20 ET, In another twist in the UC Browser tale, it appears that the “employee” who first weighed-in on the situation may not be an employee after all. A Twitter user going by the name of Mike Ross originally said that he worked for UC Browser and provided insights into why the app had been pulled from Google Play. In a statement to MobiGyaan, UCWeb said he wasn’t an employee.

“The reason for the removal has nothing to do with alleged data security breach or malicious promotion,” said UCWeb. “We would like to state that we have no records of anyone named ‘Mike Ross’ claiming to be working for UC Browser, as mentioned in some reports. The person claiming to be working for UC Browser is in no way associated with the firm nor represent the views of the company. The allegations of misleading and malicious promotions by the said person are completely false and baseless.” 

I’ve reached out to Mike Ross regarding the matter and will update this story should I receive a response.

Original coverage: November 17, 04:28 ET, UC Browser for Android, a web browsing app with half a billion installs, was suddenly removed from the Google Play Store earlier this week. The reason for its removal was unknown, though it stood to be a particularly big problem for users in India, where the app was the sixth most popular app,

Three days ago, a person claiming to work at the browser tweeted us to with an explanation. Reportedly, the employee had received an email which said that the app had been removed from Google Play for “30 days” for using “‘Misleading” and ‘Unhealthy’ methods of promotion to increase installs.”

In a statement to Gadgets 360, UCWeb, the browser’s owner, officially commented on the issue:

“We were informed by Google Play about temporary removal of UC Browser from the Play Store for 7 days, beginning 13 Nov 2017, under the reason that a certain set of UC Browser is not in line with Google’s policy. We have conducted an urgent internal investigation and fixed the problem,” UCWeb said.

“The new version has been uploaded to Google Play’s Developer Console and is awaiting evaluation. We will actively cooperate with Google Play for any concern caused by this unintentional error. In the meantime, users can still download UC Browser Mini from the Play Store, an alternative version of UC Browser.”

UCWeb has also come under fire previously following reports of privacy and security concerns, though it has denied any wrongdoing. In this scenario, it’s putting the Play Store removal down to an “unintentional error.” While these may be completely innocent issues for UCWeb, the company may have to tread carefully for a while to maintain the trust of its fans.

UCWeb says that the app would return to Google Play next week and that anybody who wanted to install it on their device in the meantime could download it manually from



Popular posts from this blog

My Life as Information security engineer Chapter 1: Tools

  Hi folks, here I am going to share the tools list that I am using in my daily life cycle. NMAP  Nmap (“Network Mapper”) is a free and open-source (license) utility for network discovery and security auditing. Basically, I will use it to discover the open ports and closed ports where I did Port Mapping in firewalls. We can use this in the local network as well as in the WAN network. Also with help of the NSE script, we do multiple things like vulnerability check, exploitation, etc., Ref: CURL and WGET curl   is a tool to transfer data from or to a server, using one of the supported protocols (HTTP, HTTPS, FTP, FTPS, SCP, SFTP, TFTP, DICT, TELNET, LDAP or FILE). Normally using this tool to analyze the website headers when my web security device blocking some dynamic content websites and to create the Application signature in IPS. Wget   using to download files directly instead of opening and surfing the brow

AquaSec Container Security Solution ( DevSecOps ) - A quickView

  What is AquaSec?      The Aqua Platform is the leading Cloud Native Application Protection Platform (CNAPP) and provides prevention, detection, and response automation across the entire application lifecycle to secure the supply chain, secure cloud infrastructure, and secure running workloads wherever they are deployed.    Solutions : Cloud Native Security Platform CSPM Cloud Security Container Security Kubernetes Security Serverless Security Cloud VM Security Dynamic Threat Analysis (DTA) Container Vulnerability Scanning Aquasec offers a 14days trial to learn the container security / Automated DevSecOps. Use this link to get free trail  Sign In | Aqua (   How to start with AquaSec? Once login into the portal click the nine dots in the left-side top > Aqua Hub  Then click the "Integrations" The Integration page has a lot of options to connect your container Platform Choosing your platform provides the required key to integrate. (follow the OEM documents ) The

What is IP Obfuscation ? How it's working ? how to use Cuteit tool ?

  What is IP  Obfuscation?     Which is a method to hide or convert a doted format IP address  (e.g.   into an Integer or Hexadecimal value or Octal form by using some mathematical formula. It’s a kind of method to spoof the human eyes and web security services. dot format to Decimal Conversion 👉  [] to translate (172 x256 3 )+(67×256 2 )+(129×256 1 )+(3×256 0 ) =  2890105091 Now you can use  https://2890105091  to access This is one of the ways to do IP  Obfuscation.  The tool  ‘ Cuteit ‘ is  A simple python tool to help you to social engineer, bypass whitelisting firewalls, potentially break regex rules for command-line logging looking for IP addresses and obfuscate cleartext strings to C2 locations within the payload. HOW TO USE CUTEIT ? Download & Install Cuteit from the below link git :   git clone Direct link: usage: Cu