Sunday, March 23, 2025
HomeAndroidAndroid Q - Beta Released with High Level Privacy and Security Features...

Android Q – Beta Released with High Level Privacy and Security Features With TLS 1.3 Support

Published on

SIEM as a Service

Follow Us on Google News

Google released a new Beta version of Android Q that brings a number of additional privacy and security features for Android users.

Since Android reached a billion users, Google has a great responsibility to ensure the user’s privacy and security from the sophisticated cyber threats that evolving day by day.

Apart from this existing privacy and security implementation, Android Q now getting additional features to protect users, like file-based encryption, OS controls requiring apps to request permission before accessing sensitive resources, locking down camera/mic background access, lockdown mode, encrypted backups.

Especially Google play protect that scans over 50 billion apps daily to identify the malicious and harmful apps and also Google brings more enhancements in this Android Q.

Improved privacy protections in Android Q

New control over apps brings let user obtain the more controls access to shared Files, especially Users will be able to control apps’ access to the Photos and Videos or the Audio collections via new runtime permissions.

Also, Google restricts access to non-resettable device identifiers, including device IMEI, serial number, and similar identifiers.

Google said. “We’re also randomizing the device’s MAC address when connected to different Wi-Fi networks by default — a setting that was optional in Android 9 Pie.”

Foldable Screens

Android Q brings the new innovative future of foldable devices that helps
your app is displayed on foldable and large screens.

Android Q

Connectivity permissions, privacy, and security

In Android Q, Google Adds new connectivity API expands to other apps such as Bluetooth, Cellular and Wi-Fi, to increase the protection around those APIs by requiring the FINE location permission instead of already require COARSE location permission for for scanning networks.

“In addition to the randomized MAC addresses that Android Q provides when connected to different Wi-Fi networks, we’re adding new Wi-Fi standard support, WPA3 and Enhanced Open, to improve security for home and work networks as well as open/public networks.,” Google Said.

In order to enhance the better security Android Q supports TLS 1.3 in which, a secure connection can be established as much as 40% faster with TLS 1.3 compared to TLS 1.2. TLS 1.3 is enabled by default for all TLS connections.

You can enroll here to get Android Q Beta updates over-the-air, on any Pixel device. If you don’t have a Pixel device, you can use the Android Emulator, and download the latest emulator system images via the SDK Manager in Android Studio.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

New Top 10 Best Android Antivirus Apps of 2019 -100 % Mobile Protection

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...