Security Blog
The latest news and insights from Google on security and safety on the Internet
Android Security & Privacy Year in Review 2018: Keeping two billion users, and their data, safe and sound
29. marts 2019
Posted by Meghan Kelly, Android Security & Privacy Team
We're excited to release today the
2018 Android Security and Privacy Year in Review
. This year's report highlights the advancements we made in Android throughout the year, and how we've worked to keep the overall ecosystem secure.
Our goal is to be open and transparent in everything we do. We want to make sure we keep our users, partners, enterprise customers, and developers up to date on the latest security and privacy enhancements in as close to real-time as possible. To that end, in 2018 we prioritized regularly providing updates through our blogs and our new
Transparency Reports
, which give a quarterly ecosystem overview. In this year-in-review, you'll see fewer words and more links to relevant articles from the previous year. Check out our
Android Security Center
to get the latest on these advancements.
In this year's report, some of our top highlights include:
New features in Google Play Protect
Ecosystem and Potentially Harmful Application family highlights
Updates on our vulnerability rewards program
Platform security enhancements
We're also excited to have Dave Kleidermacher, Vice President of Android Security and Privacy, give you a rundown of the highlights from this report. Watch his video below to learn more.
Ingen kommentarer :
Send en kommentar
Etiketter
#sharethemicincyber
#supplychain #security #opensource
android
android security
android tr
app security
big data
biometrics
blackhat
C++
chrome
chrome enterprise
chrome security
connected devices
CTF
diversity
encryption
federated learning
fuzzing
Gboard
google play
google play protect
hacking
interoperability
iot security
kubernetes
linux kernel
memory safety
Open Source
pha family highlights
pixel
privacy
private compute core
Rowhammer
rust
Security
security rewards program
sigstore
spyware
supply chain
targeted spyware
tensor
Titan M2
VDP
vulnerabilities
workshop
Archive
2025
jan.
2024
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2023
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2022
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2021
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2020
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2019
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2018
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2017
dec.
nov.
okt.
sep.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2016
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2015
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2014
dec.
nov.
okt.
sep.
aug.
jul.
jun.
apr.
mar.
feb.
jan.
2013
dec.
nov.
okt.
aug.
jun.
maj
apr.
mar.
feb.
jan.
2012
dec.
sep.
aug.
jun.
maj
apr.
mar.
feb.
jan.
2011
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
2010
nov.
okt.
sep.
aug.
jul.
maj
apr.
mar.
2009
nov.
okt.
aug.
jul.
jun.
mar.
2008
dec.
nov.
okt.
aug.
jul.
maj
feb.
2007
nov.
okt.
sep.
jul.
jun.
maj
Feed
Follow @google
Follow
Give us feedback in our
Product Forums
.
Ingen kommentarer :
Send en kommentar