Wednesday, March 19, 2025
HomeAndroidGoogle Unveils New Intelligent, Real-Time Protections for Android Users

Google Unveils New Intelligent, Real-Time Protections for Android Users

Published on

SIEM as a Service

Follow Us on Google News

Google has once again raised the bar for mobile security by introducing two new AI-powered real-time protection features for Android users.

With a strong commitment to user privacy and safety, these innovative tools aim to shield users from scams, fraud, malware, and dangerous apps, all while ensuring that users remain in control of their data.

Available first on Pixel devices, these features will soon be rolled out across more Android devices.

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

Enhanced Protection Against Scams with AI

Scam calls have become an increasingly serious issue worldwide, with scammers stealing over $1 trillion annually.

To combat this growing threat, Google is leveraging its cutting-edge artificial intelligence technology with the new Scam Detection feature, part of the “Phone by Google” app.

The AI-powered Scam Detection works in real-time, analyzing conversation patterns to identify potential scams.

For example, if a caller pretends to be from your bank and urgently requests a fund transfer due to a supposed account breach, Scam Detection will evaluate the call and provide alerts, including audio cues, haptic feedback, and visual warnings.

This helps users recognize and avoid scams before any damage is done. In addition to its high-level security, Scam Detection is designed with privacy in mind.

The feature operates entirely on-device, meaning no call audio or transcription is sent to Google servers or stored elsewhere. Users are always in control of their data, with Scam Detection being turned off by default.

It can easily be activated or deactivated in the Phone app’s settings or during any call. Initially available on the Pixel 9 series, this feature is powered by Google’s AI model, Gemini Nano, and will soon be accessible to Pixel 6 and newer models.

The beta version has already begun rolling out to English-speaking users in the U.S., and Google is actively seeking user feedback to fine-tune the service.

Google’s second major security upgrade comes in the form of live threat detection in Google Play Protect.

This tool already protects over 2.5 billion active devices from malware and dangerous apps. Now, with the addition of real-time alerts, users will be promptly notified if an app is found to be harmful, allowing them to take immediate action.

The live threat detection feature focuses initially on identifying stalkerware—malicious software that secretly monitors user activity. Using on-device AI, Google Play Protect can detect these threats based on app behavior patterns, even if the app tries to hide its malicious intent.

As with Scam Detection, all processing occurs on-device to preserve user privacy, leveraging Private Compute Core technology to ensure sensitive data remains secure.

With these new features, Google is reinforcing its commitment to user safety without compromising privacy. As scams and malware threats evolve, Google’s intelligent and real-time protections are set to become essential tools for millions of Android users globally.

Analyze Unlimited Phishing & Malware with ANY.RUN For Free - 14 Days Free Trial.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture...

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a...

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to...

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture...

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a...

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to...