Friday, February 21, 2025
HomeAndroidAndroid Q - Beta Released with High Level Privacy and Security Features...

Android Q – Beta Released with High Level Privacy and Security Features With TLS 1.3 Support

Published on

SIEM as a Service

Follow Us on Google News

Google released a new Beta version of Android Q that brings a number of additional privacy and security features for Android users.

Since Android reached a billion users, Google has a great responsibility to ensure the user’s privacy and security from the sophisticated cyber threats that evolving day by day.

Apart from this existing privacy and security implementation, Android Q now getting additional features to protect users, like file-based encryption, OS controls requiring apps to request permission before accessing sensitive resources, locking down camera/mic background access, lockdown mode, encrypted backups.

Especially Google play protect that scans over 50 billion apps daily to identify the malicious and harmful apps and also Google brings more enhancements in this Android Q.

Improved privacy protections in Android Q

New control over apps brings let user obtain the more controls access to shared Files, especially Users will be able to control apps’ access to the Photos and Videos or the Audio collections via new runtime permissions.

Also, Google restricts access to non-resettable device identifiers, including device IMEI, serial number, and similar identifiers.

Google said. “We’re also randomizing the device’s MAC address when connected to different Wi-Fi networks by default — a setting that was optional in Android 9 Pie.”

Foldable Screens

Android Q brings the new innovative future of foldable devices that helps
your app is displayed on foldable and large screens.

Android Q

Connectivity permissions, privacy, and security

In Android Q, Google Adds new connectivity API expands to other apps such as Bluetooth, Cellular and Wi-Fi, to increase the protection around those APIs by requiring the FINE location permission instead of already require COARSE location permission for for scanning networks.

“In addition to the randomized MAC addresses that Android Q provides when connected to different Wi-Fi networks, we’re adding new Wi-Fi standard support, WPA3 and Enhanced Open, to improve security for home and work networks as well as open/public networks.,” Google Said.

In order to enhance the better security Android Q supports TLS 1.3 in which, a secure connection can be established as much as 40% faster with TLS 1.3 compared to TLS 1.2. TLS 1.3 is enabled by default for all TLS connections.

You can enroll here to get Android Q Beta updates over-the-air, on any Pixel device. If you don’t have a Pixel device, you can use the Android Emulator, and download the latest emulator system images via the SDK Manager in Android Studio.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

New Top 10 Best Android Antivirus Apps of 2019 -100 % Mobile Protection

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...