Source |
GoogleSec |
Identifiant |
8500367 |
Date de publication |
2024-05-15 12:59:21 (vue: 2024-05-15 18:07:50) |
Titre |
E / S 2024: Ce qui est nouveau dans la sécurité et la confidentialité d'Android I/O 2024: What\\'s new in Android security and privacy |
Texte |
Posted by Dave Kleidermacher, VP Engineering, Android Security and Privacy
Our commitment to user safety is a top priority for Android. We\'ve been consistently working to stay ahead of the world\'s scammers, fraudsters and bad actors. And as their tactics evolve in sophistication and scale, we continually adapt and enhance our advanced security features and AI-powered protections to help keep Android users safe.
In addition to our new suite of advanced theft protection features to help keep your device and data safe in the case of theft, we\'re also focusing increasingly on providing additional protections against mobile financial fraud and scams.
Today, we\'re announcing more new fraud and scam protection features coming in Android 15 and Google Play services updates later this year to help better protect users around the world. We\'re also sharing new tools and policies to help developers build safer apps and keep their users safe.
Google Play Protect live threat detection
Google Play Protect now scans 200 billion Android apps daily, helping keep more than 3 billion users safe from malware. We are expanding Play Protect\'s on-device AI capabilities with Google Play Protect live threat detection to improve fraud and abuse detection against apps that try to cloak their actions.
With live threat detection, Google Play Protect\'s on-device AI will analyze additional behavioral signals related to the use of sensitive permissions and interactions with other apps and services. If suspicious behavior is discovered, Google Play Protect can send the app to Google for additional review and then warn users or disable the app if malicious behavior is confirmed. The detection of suspicious behavior is done on device in a privacy preserving way through Private Compute Core, which allows us to protect users without collecting data. Google Pixel, Honor, Lenovo, Nothing, OnePlus, Oppo, Sharp, Transsion, and other manufacturers are deploying live threat detection later this year.
Stronger protections against fraud and scams
We\'re also bringing additional protections to fight fraud and scams in Android 15 with two key enhancements to safeguard your information and privacy from bad apps:
Protecting One-time Passwords from Malware: With the exception of a few types of apps, such as wearable companion apps, one-time passwords are now hidden from notifications, closing a common attack vector for fraud and spyware.
Expanded Restricted Settings: To help protect more sensitive permissions that are commonly abused by fraudsters, we\'re expanding Android 13\'s restricted settings, which require additional user approval to enable permissions when installing an app from an Internet-sideloading source (web browsers, messaging apps or file managers).
We are continuing to develop new, AI-powered protections, |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
200 2024: ability abuse abused access access: across actions active activity actors adapt adding addition additional adoption advanced against ahead albums alerting allows also always analyze android announcing anomalous another api app approval apps apps: are around associated attack attacks attackswe attempts august automatically available bad banking base based battle been before behavior behavioral being better billion bring bringing broad browsers browsing build building call can capabilities capability capturing card case cell cellular check checks choose cipher clear cloak close closing cloud collaborative collecting combining coming commitment common commonly community companion compatible compute confirmed connection consistently constantly content continually continue continuing controlling controls conversation core could couple creating credentials credit criminals currently daily data dave decide defend demonstrate deploying details detect detection detects develop developers device devices devices: disable disclosure discovered dissidents done during easier ecosystem effort enable enforcing engineering enhance enhancements enter even evolve evolving exception expanded expanding expect experience exposing false favorites features fight file financial find focusing fraud fraudsters fraudulent free from further gemini genuine google granting handling hardware have having help helpful helping hidden hide honor how i/o identifier important improve includes increasingly indicator indicators individual information information: inject installing integration integrity interactions intercept interception internet introducing journalists just keep key kleidermacher know known later layer layered lenovo let lets like limit live local location logins: make making malicious malware malware: managers manufacturers many message messages messaging mobile more much multi must nano network new next nothing notification notifications notify now numbers oem oems one oneplus ongoing oppo opt other others otps over overlays particularly partnerships passwords patterns performing permissions photo photos picker pixel play policies policy post posted potential potentially power powered preferred preserve preserving prevent preventing priority privacy private progress prominent prompting protect protected protecting protection protections providing radio rather real receive recent recording related remote require requiring research respond restricted review right risk risky running safe safeguard safeguarding safeguards safer safety scale scam scammers scams scans screen search secure security seeing send sensitive services session settings settings: share share: sharing sharp shield sideloading sign signals simple simulators site sms snoop social solution sophistication source spyware start starting station stay steal stop storage stronger such suite support surveillance suspicious tactics take tap targeted testing than theft them then these they threat threats: through thwart tightening time tirelessly today too tool tools top traffic transparency: transsion truly try trying turn two types understand unencrypted unmodified unwavering updated updates upgraded use user usernames users uses using valuable vector video videos view viewers visible voice want warn way wearable web well what when which who whole will without work working world year years you your |
Tags |
Malware
Tool
Threat
Mobile
Cloud
|
Stories |
|
Move |
|