Open-sourcing Sandboxed API

Posted by Christian Blichmann & Robert Swiecki, ISE Sandboxing teamMany software projects process data which is externally generated, and thus potentially untrusted. For example, this could be the conversion of user-provided picture files into different formats, or even executing user-generated software code.When a software library parsing such data is sufficiently…

New Keystore features keep your slice of Android Pie a little safer

Posted by Lilian Young and Shawn Willden, Android Security; and Frank Salim, Google Pay[Cross-posted from the Android Developers Blog] New Android Pie Keystore FeaturesThe Android Keystore provides application developers with a set of cryptographic tools that are designed to secure their users' data. Keystore moves the cryptographic primitives available in…

Industry collaboration leads to takedown of the “3ve” ad fraud operation

Posted by Per Bjorke, Product Manager, Ad Traffic QualityFor years, Google has been waging a comprehensive, global fight against invalid traffic through a combination of technology, policy, and operations teams to protect advertisers and publishers and increase transparency throughout the advertising industry.Last year, we identified one of the most complex…

Announcing some security treats to protect you from attackers’ tricks

Posted by Jonathan Skelker, Product ManagerIt’s Halloween 🎃 and the last day of Cybersecurity Awareness Month 🔐, so we’re celebrating these occasions with security improvements across your account journey: before you sign in, as soon as you’ve entered your account, when you share information with other apps and sites, and…
1 2 3 7