Android to add new anti-theft and data protection features

Google is introducing multiple anti-theft and data protection features later this year, some available only for Android 15+ devices, while others will roll out to billions of devices running Android 10 and later.
To protect your personal and sensitive data if your device is stolen or lost, a new AI-powered automated screen lock named Theft Detection Lock will lock the screen if it detects abrupt motions associated with theft attempts, like thieves snatching your device out of your hand.
To further ensure that thieves can't access your sensitive data and apps, another new feature known as Offline Device Lock will automatically lock the device shortly after a thief disconnects it from the network or if it detects too many failed authentication attempts.
Google also announced a Remote Lock feature to help those whose Android devices were stolen lock their smartphones or tablets remotely using only their phone number and a security challenge.
Theft Detection Lock, Offline Device Lock, and Remote Lock will be available on devices running Android 10 or later through a Google Play services update that will roll out later this year.
As announced at Google I/O 2024, the new Android 15 release will also upgrade factory reset protection to make stolen devices very difficult or impossible to sell by requiring your Google account credentials during the setup process.
Roid will also require your PIN, password, or biometric authentication when trying to access or change critical Google account and device settings from an untrusted location, such as changing your PIN, accessing Passkeys, or disabling theft protection.
Disabling Find My Device or extending the device screen timeout will also require entering your PIN or password or using some form of biometric authentication.
Factory reset protection updates and private space will be released when Android 15 launches this fall, while enhanced authentication protections will be available on select devices later this year.
At Google I/O 2024, the company also announced new Android 15 and Google Play features to protect against scams, fraud, spyware, and banking malware.
Roid 15, Google Play get new anti-malware and anti-fraud features.
Roid bug leaks DNS queries even when VPN kill switch is enabled.
Finland warns of Android malware attacks breaching bank accounts.
Google now pays up to $450,000 for RCE bugs in some Android apps.


This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 15 May 2024 20:15:15 +0000


Cyber News related to Android to add new anti-theft and data protection features

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
Android to add new anti-theft and data protection features - Google is introducing multiple anti-theft and data protection features later this year, some available only for Android 15+ devices, while others will roll out to billions of devices running Android 10 and later. To protect your personal and ...
1 month ago Bleepingcomputer.com
31 Alarming Identity Theft Statistics for 2024 - Identity theft is a prevalent issue that affects millions of people annually. Although the numbers are startling, we've selected the 31 most concerning identity theft statistics to help you understand how to secure your identity. In 2022, the FTC ...
5 months ago Pandasecurity.com
The Latest Identity Theft Methods: Essential Protection Strategies Revealed - Identity theft has evolved far beyond the days of stolen mail and dumpster diving. Today's identity thieves employ sophisticated techniques, including account takeovers and government benefit fraud, making it essential for you to stay vigilant to ...
5 months ago Hackread.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
6 months ago Securityzap.com
Unmasking Identity Theft: Detection and Mitigation Strategies - In an increasingly digital world, the threat of identity theft looms large, making it imperative for individuals to be proactive in detecting potential breaches and implementing effective mitigation measures. This article delves into key strategies ...
6 months ago Cybersecurity-insiders.com
Android 15, Google Play get new anti-malware and anti-fraud features - Today, Google announced new security features coming to Android 15 and Google Play that will help block scams, fraud, and malware apps on users' devices. Announced at Google I/O 2024, the new features are designed not only to help end users but also ...
1 month ago Bleepingcomputer.com
Securing the Digital Frontier - As we navigate through a world brimming with data, understanding the evolving landscape of data protection is not just a necessity but a responsibility. This intricate dance among technology, societal norms, and regulatory frameworks shapes our ...
5 months ago Feeds.dzone.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
3 months ago Feeds.dzone.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
1 month ago Securityboulevard.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
6 months ago Securityboulevard.com
Data Privacy and Security - Organizations are gradually becoming concerned regarding data security in several instances, such as collecting and retaining sensitive information and processing personal information in external environments, which include information sharing and ...
7 months ago Feeds.dzone.com
Google Chrome adds new AI features to boost productivity and creativity - Google's popular web browser, Chrome, is getting a makeover with the latest release of Chrome M121, which introduces three new generative AI features that aim to make browsing easier, more efficient and more personalized. The new features, which are ...
5 months ago Venturebeat.com
Cybersecurity Compliance: Understanding Regulatory Frameworks - Data breaches continue to increase year over year: there was a 20% increase in data breaches from 2022 to 2023 and globally and there were twice the number of victims in 2023 as compared to 2022. Compliance frameworks vary by industry, region, and ...
2 months ago Offsec.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
6 months ago Microsoft.com
CVE-2021-22283 - Improper Initialization vulnerability in ABB Relion protection relays - 611 series, ABB Relion protection relays - 615 series IEC 4.0 FP1, ABB Relion protection relays - 615 series CN 4.0 FP1, ABB Relion protection relays - 615 series IEC 5.0, ABB ...
1 year ago
Microsoft to End Malware Delivery In Excel XLL Add-ins - Microsoft has revealed plans to end the malicious use of Excel XLL add-ins, which have been used by some to deliver malware. XLL add-ins are files that can be used to add custom functions to Excel spreadsheets. Unfortunately, these add-ins have been ...
1 year ago Bleepingcomputer.com
Rhadamanthys Stealer malware evolves with more powerful features - The developers of the Rhadamanthys information-stealing malware have recently released two major versions to add improvements and enhancements across the board, including new stealing capabilities and enhanced evasion. Rhadamanthys is a C++ ...
6 months ago Bleepingcomputer.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
3 months ago Venturebeat.com
Improved Security and Protection with Cohesity Data Cloud 70 - A data security and management company has recently released version 7.0 of its Cohesity Data Cloud platform. This new version provides customers with improved cyber resilience features to help protect their data from cyberattacks. These features ...
1 year ago Csoonline.com
New Rhadamanthys stealer version enhances features, evasion - The developers of the Rhadamanthys information-stealing malware have recently released two major versions to add improvements and enhancements across the board, including new stealing capabilities and enhanced evasion. Rhadamanthys is a C++ ...
6 months ago Bleepingcomputer.com
Papua New Guinea Sets High Bar in Data Security - COMMENTARY. In an era where data breaches and cyberattacks are becoming increasingly sophisticated, protecting sensitive data is table stakes. What really sets organizations apart is their ability to place robust protections on data that needs to be ...
3 days ago Darkreading.com
Unified API Protection - A massive segment of organizations' digital footprint today is built around internal and external APIs. As more IT leaders realize and acknowledge the size of APIs' influence, it's become clear that new methods are needed to secure those APIs. While ...
1 year ago Cequence.ai
Cybersixgill introduces new features and capabilities to strengthen threat analysis - Cybersixgill announced new features and capabilities that take security teams' threat detection and mitigation efforts to new levels, helping them identify and mitigate vulnerabilities and detect and stop threats more quickly and effectively. ...
6 months ago Helpnetsecurity.com
Snowblind malware abuses Android security feature to bypass security - A novel Android attack vector from a piece of malware tracked as Snowblind is abusing a security feature to bypass existing anti-tampering protections in apps that handle sensitive user data. Snowblind's goal is to repackage a target app to make them ...
1 week ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)