Wednesday, June 28, 2017

Android Receives a Major Security Boost by Google Play Protect


Android is generally perceived as not being one of the most secure platforms, and with over 2 billion active devices and frequent security breaches in the last couple of years, the perception isn’t entirely misplaced.

Though Google has been active in dealing with any security crisis by releasing quick updates and patches, it’s time for it to take the crusade a step further- preempt any security threat even before they happen. And for the purpose, Google in its latest I/O conference released a new feature for Android devices - Google Play Protect.

No, Google Play Protect is not any security app, but more like a three-stage security measure that will be default available on every Android device in the future. Google, after identifying the most common sources of security threats, has deployed the system.

Play Store

Though not as rigorous as iTunes, Google also does extreme vetting, especially for the security of every app before it is allowed in the Play Store. But that alone does not guarantee eternal security. For that purpose, the Play Protect seems an excellent service that will keep running 24/7 in the background to scan for any malicious or unusual behavior of any app. Poised to scan around 50 billion apps daily on all devices, the system has the potential to put a check on security vulnerabilities posed from apps.

Safe Browsing

The other possible source of security breach comes from browsing the web where just a single click on some dubious link can take users to any malicious website and put them at the risk of phishing or other security threats. To counter such instances, Google’s Play Protect enables safe browsing in Chrome that warns users before redirecting to such sites or even block them in some instances.

Find My Device

This is basically a repacked version of device manager with some added features. Not only can you track and ping your phone when you lose track of it, it can also be formatted to prevent any unauthorized access to the data within.

0 comments:

Post a Comment