Two weeks ago, Google suspended nearly three dozen malicious apps from the market. Experts tied the newer wave -- labeled "DroidDream Light" -- to the same group responsible for the Mach campaign.
Although Google may be scanning market apps for known malware, that does little good unless an antivirus company has crafted a signature that "fingerprints" the malware, Brandt said.
And with malware able to sneak into the Android Market -- and in some cases remain there for months -- it's unlikely Google has engineers scouring app code.
"It takes a lot of time and experience to evaluate code," said Brandt. "There are ways to do it in an automated fashion, but you really need a bit of human feel [to evaluate] commands and their sequence to tell if something's malicious."
Brandt's advice to Android owners?
- Google pulls more malware from Android Market
- First Look: Motorola's Photon 4G calls and computes
- Google adds '+1' rating feature to Android Market
- Google faces new round of Android malware
- Google moves fast to plug Android Wi-Fi data leaks
- Hands on: Droid Charge is cool but costly
- QuickPoll: Is a unified Android OS a good thing?
- Google to unify Android OS by Q4
- QuickPoll: Are you OK with carriers blocking Android tethering apps?
- Apple, Google will testify to Senate on location tracking
"Use some common sense," he said. "These [Plankton] apps were supposed to do things like unlike "Angry Birds." But then why did they all ask for permission to connect to the Internet?"
Google was unavailable for comment late Sunday.
Sign up for Computerworld eNewsletters.