Thursday, October 1, 2020

Lockscreen and Authentication Improvements in Android 11

Posted by Haining Chen, Vishwath Mohan, Kevin Chyn and Liz Louis, Android Security TeamAs phones become faster and smarter, they play increasingly important roles in our lives, functioning as our extended memory, our connection to the world at large,...

Improved malware protection for users in the Advanced Protection Program

Posted by Daniel Rubery, Software Engineer, Chrome, Ryan Rasti, Software Engineer, Safe Browsing, and Eric Mill, Product Manager, Chrome Security Google’s Advanced Protection Program helps secure people at higher risk of targeted online attacks, like journalists, political organizations, and activists,...

Announcing new reward amounts for abuse risk researchers

Posted by Marc Henson, Lead and Program Manager, Trust & Safety; Anna Hupa, Senior Strategist, at GoogleIt has been two years since we officially expanded the scope of Google’s Vulnerability Reward Program (VRP) to include the identification of product...

Pixel 4a is the first device to go through ioXt at launch

Posted by Eugene Liderman and Xevi Miro Bruix, Android Security and Privacy TeamTrust is very important when it comes to the relationship between a user and their smartphone. While phone functionality and design can enhance the user experience, security...

Towards native security defenses for the web ecosystem

Posted by Artur Janc and Lukas Weichselbaum, Information Security EngineersWith the recent launch of Chrome 83, and the upcoming release of Mozilla Firefox 79, web developers are gaining powerful new security mechanisms to protect their applications from common web...

System hardening in Android 11

Posted by Android Platform Hardening Team In Android 11 we continue to increase the security of the Android platform. We have moved to safer default settings, migrated to a hardened memory allocator, and expanded the use of...

11 Weeks of Android: Privacy and Security

Posted by Charmaine D'Silva, Product Lead, Android Privacy and Framework, Narayan Kamath, Engineering Lead, Android Privacy and Framework, Stephan Somogyi, Product Lead, Android Security and Sudhi Herle, Engineering Lead, Android Security This blog post is part of a...

Making the Advanced Protection Program and Titan Security Keys easier to use on Apple iOS devices

Posted by Christiaan Brand, Product Manager, Google Cloud Starting today, we’re rolling out a change that enables native support for the W3C WebAuthn implementation for Google Accounts on Apple devices running iOS 13.3 and above. This capability, available for both...

The Advanced Protection Program comes to Google Nest

Posted by Shuvo Chatterjee, Product Manager, Advanced Protection ProgramThe Advanced Protection Program is our strongest level of Google Account security for people at high risk of targeted online attacks, such as journalists, activists, business leaders, and people working on...

Expanding our work with the open source security community

Posted by Eduardo Vela, Vulnerability Collector, Google At Google, we’ve always believed in the benefits and importance of using open source technologies to innovate. We enjoy being a part of the community and we want to give back in new...

Enhanced Safe Browsing Protection now available in Chrome

Posted by Nathan Parker, Varun Khaneja, Eric Mill and Kiran C Nair - Chrome Safe Browsing team Over the past few years we’ve seen threats on the web becoming increasingly sophisticated. Phishing sites rotate domains very quickly to avoid...

Introducing portability of Google Authenticator 2SV codes across Android devices

Posted by Dongjing He, Software Engineer; Teddy Katz, Software Engineer; Christiaan Brand, Product ManagerToday is World Password Day, and we found it fitting to release an update that'll make it even easier for users to manage Google Authenticator 2-Step Verification (2SV) codes...

Research Grants to support Google VRP Bug Hunters during COVID-19

Posted by Anna Hupa, Senior Strategist, Trust & Safety at GoogleIn 2015, we launched our Vulnerability Research Grant program, which allows us to recognize the time and efforts of security researchers, including the situations where they don't find any...

Research Grants to support Google VRP Bug Hunters during COVID-19

Posted by Anna Hupa, Senior Strategist, Trust & Safety at Google

Introducing our new book “Building Secure and Reliable Systems”

Posted by Royal Hansen, VP of Security Engineering, GoogleFor years, I’ve wished that someone would write a book like this. Since their publication, I’ve often admired and recommended the Google Site Reliability Engineering (SRE) books—so I was thrilled to...
Bruce Schneier

Detecting Deep Fakes with a Heartbeat

Researchers can detect deep fakes because they don’t convincingly mimic human blood circulation in the face: In particular, video of a person’s face contains subtle shifts in color that result from pulses in blood circulation. You might imagine that these...

Anthem to Pay Nearly $40M Settlement Over 2015 Cyberattack

Health insurer Anthem has agreed to another multimillion-dollar settlement over a cyberattack on its technology that exposed the personal information of nearly 79 million people. read more

#BeCyberSmart – why friends don’t let friends get scammed

Friends don't let friends get scammed. Because cybercrime hurts us all.
IBM Security

Why a Security Maturity Model Can Transform How You Use Analytics

With cyberattacks and breaches on the rise, security should be a major concern for all companies. In particular, enabling the development of an analytics maturity model is a useful addition to your traditional security information and event management (SIEM)-based...

Russia’s Fancy Bear Hackers Likely Penetrated a US Federal Agency

New clues indicate that APT28 may be behind a mysterious intrusion that US officials disclosed last week.