Category: Google Online Security Blog

How we fought bad apps and developers in 2021

This article has been indexed from Google Online Security Blog Posted by Steve Kafka and Khawaja Shams, Android Security and Privacy Team Providing a safe experience to billions of users continues to be one of the highest priorities for Google…

Mitigating kernel risks on 32-bit ARM

This article has been indexed from Google Online Security Blog Posted by Ard Biesheuvel, Google Open Source Security Team Linux kernel support for the 32-bit ARM architecture was contributed in the late 90s, when there was little corporate involvement in Linux…

Vulnerability Reward Program: 2021 Year in Review

This article has been indexed from Google Online Security Blog Posted by Sarah Jacobus, Vulnerability Rewards Team  Last year was another record setter for our Vulnerability Reward Programs (VRPs). Throughout 2021, we partnered with the security researcher community to identify…

Apache Log4j Vulnerability

This article has been indexed from Google Online Security Blog Like many other companies, we’re closely following the multiple CVEs regarding Apache Log4j 2. Our security teams are investigating any potential impact on Google products and services and are focused…

Understanding the Impact of Apache Log4j Vulnerability

This article has been indexed from Google Online Security Blog Posted by James Wetter and Nicky Ringland, Open Source Insights Team  More than 35,000 Java packages, amounting to over 8% of the Maven Central repository (the most significant Java package…

Improving OSS-Fuzz and Jazzer to catch Log4Shell

This article has been indexed from Google Online Security Blog Posted by Jonathan Metzman, Google Open Source Security Team The discovery of the Log4Shell vulnerability has set the internet on fire. Similar to shellshock and heartbleed, Log4Shell is just the…

Exploring Container Security: A Storage Vulnerability Deep Dive

This article has been indexed from Google Online Security Blog Posted by Fabricio Voznika and Mauricio Poppe, Google Cloud  Kubernetes Security is constantly evolving – keeping pace with enhanced functionality, usability and flexibility while also balancing the security needs of…

ClusterFuzzLite: Continuous fuzzing for all

This article has been indexed from Google Online Security Blog Posted by Jonathan Metzman, Google Open Source Security Team In recent years, continuous fuzzing has become an essential part of the software development lifecycle. By feeding unexpected or random data…

Pixel 6: Setting a new standard for mobile security

This article has been indexed from Google Online Security Blog Posted by Dave Kleidermacher, Jesse Seed, Brandon Barbello, Android, Pixel & Tensor security teams With Pixel 6 and Pixel 6 Pro, we’re launching our most secure Pixel phone yet, with…

Launching a collaborative minimum security baseline

This article has been indexed from Google Online Security Blog Posted by Royal Hansen, Vice President, Security  According to an Opus and Ponemon Institute study, 59% of companies have experienced a data breach caused by one of their vendors or…

Introducing the Secure Open Source Pilot Program

This article has been indexed from Google Online Security Blog Posted by Meder Kydyraliev and Kim Lewandowski, Google Open Source Security Team Over the past year we have made a number of investments to strengthen the security of critical open…

Distroless Builds Are Now SLSA 2

This article has been indexed from Google Online Security Blog Posted by Priya Wadhwa and Appu Goundan, Google Open Source Security Team A few months ago we announced that we started signing all distroless images with cosign, which allows users…

An update on Memory Safety in Chrome

This article has been indexed from Google Online Security Blog Adrian Taylor, Andrew Whalley, Dana Jansens and Nasko Oskov, Chrome security team Security is a cat-and-mouse game. As attackers innovate, browsers always have to mount new defenses to stay ahead,…

Google Supports Open Source Technology Improvement Fund

This article has been indexed from Google Online Security Blog Posted by Kaylin Trychon, Google Open Source Security Team  We recently pledged to provide $100 million to support third-party foundations that manage open source security priorities and help fix vulnerabilities.…

Introducing Android’s Private Compute Services

This article has been indexed from Google Online Security Blog Posted by Suzanne Frey, VP, Product, Android & Play Security and Privacy We introduced Android’s Private Compute Core in Android 12 Beta. Today, we’re excited to announce a new suite…

Simplifying Titan Security Key options for our users

This article has been indexed from Google Online Security Blog Posted by Christiaan Brand, Product Manager, Google Cloud Today we are excited to announce some changes to our lineup of Titan Security Keys on the Google Store which provide a…

Linux Kernel Security Done Right

This article has been indexed from Google Online Security Blog Posted by Kees Cook, Software Engineer, Google Open Source Security Team To borrow from an excellent analogy between the modern computer ecosystem and the US automotive industry of the 1960s,…

Linux Kernel Security Done Right

This article has been indexed from Google Online Security Blog Posted by Kees Cook, Software Engineer, Google Open Source Security Team To borrow from an excellent analogy between the modern computer ecosystem and the US automotive industry of the 1960s,…

Advancing an inclusive, diverse security industry

This article has been indexed from Google Online Security Blog Posted by Sarah Morales, Community Outreach Manager, Security  It’s no secret that lack of diversity in corporate America is a well-documented problem and improvements have been slow. To help improve…

Protecting more with Site Isolation

This article has been indexed from Google Online Security Blog Posted by Charlie Reis​ and Alex Moshchuk, Chrome Security Team Chrome’s Site Isolation is an essential security defense that makes it harder for malicious web sites to steal data from…

Protecting more with Site Isolation

This article has been indexed from Google Online Security Blog Posted by Charlie Reis​ and Alex Moshchuk, Chrome Security Team Chrome’s Site Isolation is an essential security defense that makes it harder for malicious web sites to steal data from…

Advancing an inclusive, diverse security industry

This article has been indexed from Google Online Security Blog Posted by Sarah Morales, Community Outreach Manager, Security  It’s no secret that lack of diversity in corporate America is a well-documented problem and improvements have been slow. To help improve…

Verifiable design in modern systems

This article has been indexed from Google Online Security Blog Posted by Ryan Hurst, Production Security Team The way we design and build software is continually evolving. Just as we now think of security as something we build into software…

Announcing a unified vulnerability schema for open source

This article has been indexed from Google Online Security Blog Posted by Oliver Chang, Google Open Source Security team and Russ Cox, Go team  In recent months, Google has launched several efforts to strengthen open-source security on multiple fronts. One…

Verifiable Supply Chain Metadata for Tekton

This article has been indexed from Google Online Security Blog Posted by Dan Lorenc, Priya Wadhwa, Open Source Security TeamIf you’ve been paying attention to the news at all lately, you’ve probably noticed that software supply chain attacks are rapidly…

Rust/C++ interop in the Android Platform

This article has been indexed from Google Online Security Blog Posted by Joel Galenson and Matthew Maurer, Android Team One of the main challenges of evaluating Rust for use within the Android platform was ensuring we could provide sufficient interoperability…

Rust/C++ interop in the Android Platform

This article has been indexed from Google Online Security Blog Posted by Joel Galenson and Matthew Maurer, Android Team One of the main challenges of evaluating Rust for use within the Android platform was ensuring we could provide sufficient interoperability…

Verifiable Supply Chain Metadata for Tekton

This article has been indexed from Google Online Security Blog Posted by Dan Lorenc, Priya Wadhwa, Open Source Security TeamIf you’ve been paying attention to the news at all lately, you’ve probably noticed that software supply chain attacks are rapidly…

Announcing New Abuse Research Grants Program

This article has been indexed from Google Online Security Blog Posted by Anna Hupa,  Marc Henson, and Martin Straka, Google VRP Team  Our Abuse Bug Bounty program has proved tremendously successful in the past three years since its introduction –…

Introducing Security By Design

This article has been indexed from Google Online Security Blog Posted by Jon Markoff and Sean Smith, Android Security and Privacy Team Integrating security into your app development lifecycle can save a lot of time, money, and risk. That’s why…

Integrating Rust Into the Android Open Source Project

This article has been indexed from Google Online Security Blog Posted by Ivan Lozano, Android Team The Android team has been working on introducing the Rust programming language into the Android Open Source Project (AOSP) since 2019 as a memory-safe…

Integrating Rust Into the Android Open Source Project

Posted by Ivan Lozano, Android Security & Privacy Team The Android team has been working on introducing the Rust programming language into the Android Open Source Project (AOSP) since 2019 as a memory-safe alternative for platform native code development. As…

Rust in the Linux kernel

Read the original article: Rust in the Linux kernel Posted by Wedson Almeida Filho, Android Team In our previous post, we announced that Android now supports the Rust programming language for developing the OS itself. Related to this, we are…

Rust in the Android platform

Read the original article: Rust in the Android platform Posted by Jeff Vander Stoep and Stephen Hines, Android Team Correctness of code in the Android platform is a top priority for the security, stability, and quality of each Android release.…

Announcing the Android Ready SE Alliance

Read the original article: Announcing the Android Ready SE Alliance Posted by Sudhi Herle and Jason Wong, Android Team When the Pixel 3 launched in 2018, it had a new tamper-resistant hardware enclave called Titan M. In addition to being…

Announcing the winners of the 2020 GCP VRP Prize

Read the original article: Announcing the winners of the 2020 GCP VRP Prize Posted by Harshvardhan Sharma, Information Security Engineer, Google  We first announced the GCP VRP Prize in 2019 to encourage security researchers to focus on the security of…

Announcing the winners of the 2020 GCP VRP Prize

Read the original article: Announcing the winners of the 2020 GCP VRP Prize Posted by Harshvardhan Sharma, Information Security Engineer, Google  We first announced the GCP VRP Prize in 2019 to encourage security researchers to focus on the security of…

Google, HTTPS, and device compatibility

Read the original article: Google, HTTPS, and device compatibility Posted by Ryan Hurst, Product Management, Google Trust Services Encryption is a fundamental building block when you’re on a mission to organize the world’s information and make it universally accessible with…

A Spectre proof-of-concept for a Spectre-proof web

Read the original article: A Spectre proof-of-concept for a Spectre-proof web Posted by Stephen Röttger and Artur Janc, Information Security Engineers Three years ago, Spectre changed the way we think about security boundaries on the web. It quickly became clear…

#ShareTheMicInCyber: Brooke Pearson

Read the original article: #ShareTheMicInCyber: Brooke Pearson Posted by Parisa Tabriz, Head of Chrome Product, Engineering and UX  In an effort to showcase the breadth and depth of Black+ contributions to security and privacy fields, we’ve launched a profile series…

Fuzzing Java in OSS-Fuzz

Read the original article: Fuzzing Java in OSS-Fuzz Posted by Jonathan Metzman, Google Open Source Security Team OSS-Fuzz, Google’s open source fuzzing service, now supports fuzzing applications written in Java and other Java Virtual Machine (JVM) based languages (e.g. Kotlin,…

#ShareTheMicInCyber: Rob Duhart

Read the original article: #ShareTheMicInCyber: Rob Duhart Posted by Matt Levine, Director, Risk Management In an effort to showcase the breadth and depth of Black+ contributions to security and privacy fields, we’ve launched a series in support of #ShareTheMicInCyber that aims…

#ShareTheMicInCyber: Rob Duhart

Read the original article: #ShareTheMicInCyber: Rob Duhart Posted by Matt Levine, Director, Risk Management In an effort to showcase the breadth and depth of Black+ contributions to security and privacy fields, we’ve launched a series in support of #ShareTheMicInCyber that aims…

New Password Checkup Feature Coming to Android

Read the original article: New Password Checkup Feature Coming to Android Posted by Arvind Kumar Sugumar, Software Engineer, Android Team With the proliferation of digital services in our lives, it’s more important than ever to make sure our online information…

Mitigating Memory Safety Issues in Open Source Software

Read the original article: Mitigating Memory Safety Issues in Open Source Software Posted by Dan Lorenc, Infrastructure Security Team Memory-safety vulnerabilities have dominated the security field for years and often lead to issues that can be exploited to take over…

Mitigating Memory Safety Issues in Open Source Software

Read the original article: Mitigating Memory Safety Issues in Open Source Software Posted by Dan Lorenc, Infrastructure Security Team Memory-safety vulnerabilities have dominated the security field for years and often lead to issues that can be exploited to take over…

Vulnerability Reward Program: 2020 Year in Review

Read the original article: Vulnerability Reward Program: 2020 Year in Review Posted by Anna Hupa, Senior Strategist, Vulnerability Rewards Team Despite the challenges of this unprecedented year, our vulnerability researchers have achieved more than ever before, partnering with our Vulnerability…

Data Driven Security Hardening in Android

Read the original article: Data Driven Security Hardening in Android Posted by Kevin Deus, Joel Galenson, Billy Lau and Ivan Lozano, Android Security & Privacy Team The Android platform team is committed to securing Android for every user across every…

Data Driven Security Hardening in Android

Read the original article: Data Driven Security Hardening in Android Posted by Kevin Deus, Joel Galenson, Billy Lau and Ivan Lozano, Android Security & Privacy Team The Android platform team is committed to securing Android for every user across every…

New Year, new password protections in Chrome

Read the original article: New Year, new password protections in Chrome Posted by Ali Sarraf, Product Manager, Chrome Passwords help protect our online information, which is why it’s never been more important to keep them safe. But when we’re juggling…

How the Atheris Python Fuzzer Works

Read the original article: How the Atheris Python Fuzzer Works Posted by Ian Eldred Pudney, Google Information Security  On Friday, we announced that we’ve released the Atheris Python fuzzing engine as open source. In this post, we’ll briefly talk about…

Announcing Bonus Rewards for V8 Exploits

Read the original article: Announcing Bonus Rewards for V8 Exploits Posted by Martin Barbella, Chrome Vulnerability Rewards Panelist Starting today, the Chrome Vulnerability Rewards Program is offering a new bonus for reports which demonstrate exploitability in V8, Chrome’s JavaScript engine.…

Fostering research on new web security threats

Read the original article: Fostering research on new web security threats Posted by Artur Janc and Jan Gora, Information Security Engineers  The web is an ecosystem built on openness and composability. It is an excellent platform for building capable applications,…

Announcing our open source security key test suite

Read the original article: Announcing our open source security key test suite Posted by Fabian Kaczmarczyck, Software Engineer, Jean-Michel Picod, Software Engineer and Elie Bursztein, Security and Anti-abuse Research Lead Security keys and your phone’s built-in security keys are reshaping…

Privacy-preserving features in the Mobile Driving License

Read the original article: Privacy-preserving features in the Mobile Driving License Posted by David Zeuthen, Shawn Willden and René Mayrhofer, Android Security and Privacy team In the United States and other countries a Driver’s License is not only used to…

Fuzzing internships for Open Source Software

Read the original article: Fuzzing internships for Open Source Software Posted by Abhishek Arya, Chrome Security team Open source software is the foundation of many modern software products. Over the years, developers increasingly have relied on reusable open source components…

New Password Protections (and more!) in Chrome

Read the original article: New Password Protections (and more!) in Chrome Posted by AbdelKarim Mardini, Senior Product Manager, Chrome Passwords are often the first line of defense for our digital lives. Today, we’re improving password security on both Android and…

New Password Protections (and more!) in Chrome

Read the original article: New Password Protections (and more!) in Chrome Posted by AbdelKarim Mardini, Senior Product Manager, Chrome Passwords are often the first line of defense for our digital lives. Today, we’re improving password security on both Android and…

Lockscreen and Authentication Improvements in Android 11

Read the original article: Lockscreen and Authentication Improvements in Android 11 Posted by Haining Chen, Vishwath Mohan, Kevin Chyn and Liz Louis, Android Security Team[Cross-posted from the Android Developers Blog] As phones become faster and smarter, they play increasingly important…

Towards native security defenses for the web ecosystem

Read the original article: Towards native security defenses for the web ecosystem Posted by Artur Janc and Lukas Weichselbaum, Information Security Engineers With the recent launch of Chrome 83, and the upcoming release of Mozilla Firefox 79, web developers are…

System hardening in Android 11

Read the original article: System hardening in Android 11 Posted by Platform Hardening Team In Android 11 we continue to increase the security of the Android platform. We have moved to safer default settings, migrated to a hardened memory allocator,…

System hardening in Android 11

Read the original article: System hardening in Android 11 Posted by Android Platform Hardening Team In Android 11 we continue to increase the security of the Android platform. We have moved to safer default settings, migrated to a hardened memory…

11 Weeks of Android: Privacy and Security

Read the original article: 11 Weeks of Android: Privacy and Security Posted by Charmaine D’Silva, Product Lead, Android Privacy and Framework, Narayan Kamath, Engineering Lead, Android Privacy and Framework, Stephan Somogyi, Product Lead, Android Security and Sudhi Herle, Engineering Lead,…

The Advanced Protection Program comes to Google Nest

Read the original article: The Advanced Protection Program comes to Google Nest Posted by Shuvo Chatterjee, Product Manager, Advanced Protection Program The Advanced Protection Program is our strongest level of Google Account security for people at high risk of targeted…