Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Android Q Brings New Privacy and Security Features

Released in Beta 1 last week, the latest Android iteration (Android Q) arrived with new privacy protection improvements and other security enhancements. 

Released in Beta 1 last week, the latest Android iteration (Android Q) arrived with new privacy protection improvements and other security enhancements. 

Building on previously introduced features such as file-based encryption, lockdown mode, encrypted backups, Google Play Protect, and more, Android Q brings more control over location access, improved transparency, and better data security (many of the enhancements are part of Google’s Project Strobe).

In Android Q, for example, apps still need to ask for permission to get location, but users can set different permission levels, such as never, only when the app is in use (running), or all the time (when in the background).

“To maintain a good user experience, design your app to gracefully handle when your app doesn’t have background location permission or when it doesn’t have any access to location,” Google tells application developers. 

Because users are more likely to grant permissions to an app if they clearly understand the reason for which the app needs them, developers are advised to ask for the location permission from users in context, such as when a feature that requires location is enabled. Developers are also advised to only ask for the level of access required for that feature. 

The upcoming platform release also provides users with more control over access to shared files, such as photos, videos, and audio collections, via new runtime permissions. Apps will need to use the system file picker for downloads, which allows users to decide which Download files the app can access. 

Android Q will also prevent apps from launching an Activity while in the background, thus preventing them from coming into focus and taking over the screen. Developers will be able to use high-priority notifications and provide a full-screen intent if their app needs to get the user’s attention quickly. 

Google will limit access to non-resettable device identifiers, such as device IMEI, serial number, and similar identifiers, and will randomize a device’s MAC address when connected to different Wi-Fi networks by default. 

Advertisement. Scroll to continue reading.

The next Android release will remove access to /proc/net, which includes information about a device’s network state, thus requiring applications that need access to such information to refer to the NetworkStatsManager and ConnectivityManager classes.

Access to the clipboard data will only be available to the default input method editor (IME) and the application that currently has focus. Furthermore, applications will only be able to read the serial number of a USB device after the user has granted permissions to access the device. 

Related: Google Improves Android Encryption with Adiantum

Related: Google Boosts Protection of Backups in Android

Related: Google Tightens Rules Around App Permissions

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.