Skip to main content

Android Q — Google Adds New Mobile Security and Privacy Features

Google published about Android Q, here I have summarized all new privacy and security features of the new version of Android you can quickly learn from:

1) Stop Android Apps From Tracking Your Location in the Background


Android Q gives you more control over how an app can use your device location information. Currently, you have a single option to either allow or deny an app access to your device location, doesn't matter if it is in-use or running in the background.
However, starting from Android Q, you can choose between three options, just like iOS: allowing an app to access location "all the time," "while in use," i.e., when the app is in the foreground, or "Deny."

2) New Restrictions On Apps' Access to Device Identifiers


A) Contacts Affinity — Starting from Android Q, the operating system will no longer keep the track of contacts affinity information, meaning that apps searching for user's contacts will not be able to do so.

B) Making MAC Address Randomization a Default Feature — Introduced in Android 6.0 Marshmallow, the feature will now come enabled by default with Android Q, preventing app developers, location analytics firms, stores, and others from using MAC addresses to build a history of your device activity.

3) Background Apps Can't Start A New Activity Without User Interaction


Android Q also comes with new restrictions, preventing apps from launching activities while in the background without user interaction, keeping users more in control of what's shown on their screen.
In nearly all cases, Google has now made it mandatory for apps that are in the background to create notifications in order to provide information to users instead of directly starting an activity.

4) Apps Can't Change Location and Network Settings


Android Q makes it mandatory for apps to have the ACCESS_FINE_LOCATION permission to use several methods within the Wi-Fi, Wi-Fi Aware, or Bluetooth APIs.

This means now third-party apps will not be able to make changes to your device Wi-Fi (enable or disable); instead apps have to prompt users to enable or disable Wi-Fi in the device settings manually.

To protect user privacy, performing manual configuration of the list of Wi-Fi networks will now be only restricted to system apps.

Comments

Popular posts from this blog

Site-to-site IPsec VPN with two FortiGates

In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard's   Site to Site - FortiGate   template. In this example, one office will be referred to as HQ and the other will be referred to as Branch. 1. Configuring the HQ IPsec VPN On the HQ FortiGate, go to  VPN > IPsec Wizard . Select the  Site to Site  template, and select  FortiGate . In the  Authentication  step, set  IP Address  to the IP of the Branch FortiGate (in the example,  172.20.120.135 ). After you enter the gateway, an available interface will be assigned as the  Outgoing Interface . If you wish to use a different interface, select it from the drop-down menu. Set a secure  Pre-shared Key . In the  Policy & Routing  step, set the  Loca...

Be fraud aware - What are phishing, smishing and vishing.

  You may have heard the terms phishing, smishing or vishing before, but what exactly do they mean? At their core, all three terms are a type of financial fraud which tricks unsuspecting victims into giving out sensitive personal information, handing over money or installing malware onto their device. The only difference between each term is the channel via which you can be targeted; phishing refers to scam emails, smishing refers to scam text or WhatsApp messages and vishing takes place over the phone. Phishing The most common phishing method encourages victims to visit a malicious website through a fake email message, which appears to be sent from a legitimate company or source (e.g. from a bank, HMRC, a delivery company or the NHS). For example, you might receive an email which appears to be from an organisation who you’re familiar with, asking you to click on a link. At this point you will be taken to a webpage on which you’re asked to submit sensitive data, such as passwords, ...

Cisco Releases Security Updates for Cisco ASA 5506-X, 5508-X, 5516-X and Firepower// Cisco Bug IDs: CSCvp36425

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note:  Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. Cisco has...