Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    How Google Secures Over a Billion Android Users

    Written by

    Sean Michael Kerner
    Published February 15, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      SAN FRANCISCO—Delivering secure mobile technology to billions of users and protecting them from both known and unknown threats is no easy task, but it’s the task that Google has aggressively taken on with Android. Speaking at the RSA Conference here, Adrian Ludwig, director of Android security at Google, detailed the methods used by Google to keep its mobile platform and its billions of users secure.

      Among the myriad challenges that Google faces is the simple fact that there are many different devices and configurations used by handset vendors and carriers for Android. Getting all the devices updated with Google’s latest security features isn’t something that can happen overnight. For example, with Android 5.0 “Lollipop,” which was first released in 2014, few users made use of device encryption. With Android 6.0 “Marshmallow,” which was released in 2015, approximately 20 percent of devices are encrypted. With Android 7 “Nougat,” which debuted this year, Google made encryption even easier to deploy. As a result, 80 percent of Nougat devices use encryption.

      Android provides not only encryption now, but also application isolation, device integrity and exploit mitigation capabilities directly as part of the operating system. In addition to the operating system security features, having security services on the platform is also necessary, Ludwig said.

      Google has multiple security services, including Verify Apps, an anti-malware scanning service that looks for malware on devices. Google also has a sensor network that looks for potential compromises across the Android landscape. And Google has device management services such as device locking and remote wiping, as well as APIs that enable Enterprise Mobility Management (EMM) applications to provide even more services.

      “Scale is a key differentiator for Google,” Ludwig said. “We do over 750 million device scans per day and check over 6 billion apps per day.”

      Ludwig took specific aim at the issue of malware apps on Android. According to Google’s latest data, only 0.69 percent of all Android devices have some form of potentially harmful app, he said. Going a level deeper, for devices that only get apps from the official Google Play app store, Ludwig estimates that at most only 0.05 percent of such Android devices have ever encountered some form of potentially harmful app.

      The key lesson from these figures, Ludwig emphasized, is that it’s significantly safer to download and use apps from Google Play than from non-Google app sources.

      “So don’t install apps from outside of Google Play,” he said.

      Malware

      While malicious apps are a concern, the reality is that is not how Android users are actually being exploited. Rather, Ludwig sees social engineering attacks as being the primary attack vector against Android today.

      With social engineering attacks, a user sees, for example, a spam advertisement asking the user to install something that then compromises his or her device in some way.

      Ludwig also took direct aim at the media and widespread reports about big vulnerabilities including the MasterKey, FakeID and Stagefright vulnerabilities that have been disclosed at the Black Hat conference in recent years.

      For example, the headlines about Stagefright claimed a billion users were at risk. But Ludwig refuted that claim, saying the reality is very different, noting that Google has no confirmed evidence of user exploitation.

      Looking forward, Ludwig realizes that Google still has work to do to make Android even more secure. Among the big challenges is reducing the amount of time it takes for carriers and device vendors to make security updates available, which is an area that Google is actively working to address. Ludwig also expects to continue to grow Google’s bug bounty program for Android, rewarding researchers for reporting potential security issues.

      Fundamentally, while the challenges of securing over a billion users falls on Google, Ludwig noted that for users, the bottom line is it all should just work.

      “People don’t want to think about security, they; just want it to be that way,” he said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.