Tuesday, October 15, 2024
HomeAndroidAndroid Q - Beta Released with High Level Privacy and Security Features...

Android Q – Beta Released with High Level Privacy and Security Features With TLS 1.3 Support

Published on

Malware protection

Google released a new Beta version of Android Q that brings a number of additional privacy and security features for Android users.

Since Android reached a billion users, Google has a great responsibility to ensure the user’s privacy and security from the sophisticated cyber threats that evolving day by day.

Apart from this existing privacy and security implementation, Android Q now getting additional features to protect users, like file-based encryption, OS controls requiring apps to request permission before accessing sensitive resources, locking down camera/mic background access, lockdown mode, encrypted backups.

- Advertisement - SIEM as a Service

Especially Google play protect that scans over 50 billion apps daily to identify the malicious and harmful apps and also Google brings more enhancements in this Android Q.

Improved privacy protections in Android Q

New control over apps brings let user obtain the more controls access to shared Files, especially Users will be able to control apps’ access to the Photos and Videos or the Audio collections via new runtime permissions.

Also, Google restricts access to non-resettable device identifiers, including device IMEI, serial number, and similar identifiers.

Google said. “We’re also randomizing the device’s MAC address when connected to different Wi-Fi networks by default — a setting that was optional in Android 9 Pie.”

Foldable Screens

Android Q brings the new innovative future of foldable devices that helps
your app is displayed on foldable and large screens.

Android Q

Connectivity permissions, privacy, and security

In Android Q, Google Adds new connectivity API expands to other apps such as Bluetooth, Cellular and Wi-Fi, to increase the protection around those APIs by requiring the FINE location permission instead of already require COARSE location permission for for scanning networks.

“In addition to the randomized MAC addresses that Android Q provides when connected to different Wi-Fi networks, we’re adding new Wi-Fi standard support, WPA3 and Enhanced Open, to improve security for home and work networks as well as open/public networks.,” Google Said.

In order to enhance the better security Android Q supports TLS 1.3 in which, a secure connection can be established as much as 40% faster with TLS 1.3 compared to TLS 1.2. TLS 1.3 is enabled by default for all TLS connections.

You can enroll here to get Android Q Beta updates over-the-air, on any Pixel device. If you don’t have a Pixel device, you can use the Android Emulator, and download the latest emulator system images via the SDK Manager in Android Studio.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

New Top 10 Best Android Antivirus Apps of 2019 -100 % Mobile Protection

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...