Monday, May 19, 2025
HomeAIGoogle Chrome Uses Advanced AI to Combat Sophisticated Online Scams

Google Chrome Uses Advanced AI to Combat Sophisticated Online Scams

Published on

SIEM as a Service

Follow Us on Google News

Google has integrated artificial intelligence into its cybersecurity toolkit to shield users from financial and data theft scams.

On Friday, May 09, 2025, the company unveiled a comprehensive report detailing its latest AI-driven initiatives across Search, Chrome, and Android, marking a significant leap in preemptive threat detection and user protection.

These advancements aim to counteract increasingly sophisticated scams, from phishing sites to malicious notifications and fraudulent communications.

- Advertisement - Google News

Google’s Search engine now blocks hundreds of millions of scam-related results daily, a 20-fold increase in detected malicious pages compared to previous systems.

This improvement stems from enhancements in AI classifiers capable of analyzing vast web content datasets, identifying emerging scam patterns, and neutralizing coordinated campaigns.

For instance, the report highlights a surge in fake airline customer service portals designed to steal payment details.

By training models on linguistic cues and behavioral metrics, Google reduced these scams by 80% in Search results, ensuring users receive legitimate contact information when seeking urgent travel support.

The AI systems also prioritize speed, recognizing novel threats within hours of their emergence.

This agility is critical as scammers rapidly adapt tactics, such as mimicking government agencies during tax season or creating counterfeit e-commerce platforms during holiday shopping periods.

Gemini Nano On-Device Defense

Google Chrome’s Enhanced Safe Browsing mode, which already doubles protection against phishing compared to standard settings, now integrates Gemini Nano-a lightweight, on-device large language model (LLM).

Unlike cloud-dependent solutions, Gemini Nano processes data locally, enabling real-time analysis of website text, structure, and metadata without compromising privacy.

This approach excels at identifying zero-day scams, including fraudulent tech support pages that prompt users to download malware or share credentials.

Initial deployments targeting remote tech support scams have shown promise, with plans to expand coverage to Android devices and additional scam categories like fake investment schemes.

The LLM’s ability to interpret context-such as distinguishing legitimate software update prompts from malicious imitations-ensures robust defense layers even as attackers refine their social engineering tactics.

Neutralizing Malicious Notifications

Malicious websites often exploit browser notification permissions to bombard users with spam, fake alerts, or phishing links.

Chrome for Android now employs on-device machine learning models to detect suspicious notification patterns.

When flagged, users receive a warning with options to block future alerts or review intercepted content.

This system minimizes false positives by learning from user feedback; those who dismiss a warning can opt to retain notifications from the site, refining the model’s accuracy over time.

Beyond browsers, Google’s AI safeguards extend to communication channels. The Phone and Messages apps on Android utilize on-device AI to analyze incoming calls and texts for scam indicators.

For calls, the system evaluates vocal cadence, background noise, and request urgency (e.g., demands for immediate gift card payments).

In Messages, it scans for phishing links, fake prize notifications, or impersonation attempts (e.g., messages posing as banks). Suspected scams trigger real-time alerts, empowering users to terminate interactions before divulging sensitive data.

Google acknowledges that scammers will continue refining their methods, necessitating equally dynamic countermeasures.

Future updates aim to deploy cross-platform AI models that correlate threats across Search, Chrome, and Android, enabling faster threat intelligence sharing.

For example, a phishing domain identified in Gmail could be preemptively blocked in Chrome within minutes.

Additionally, the company is exploring generative AI to simulate scam scenarios for training detection systems, ensuring preparedness for emerging social engineering techniques.

Are you Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Latest articles

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...