Android Nougat: Google OS' Tightest Security Yet

This article is exclusively written for TeskaLabs by J’s Tech Journal

Officially released a month ago, the latest Google mobile OS version has made a few major adjustments, particularly in its security features. The search giant has improved the security in the Android Nougat (or also known as Android N) from strengthening the Android itself to some tools that helps developers to keep things as it is while users install apps.

Adrian Ludwig, head of the Android security team, highlighted three key security features on the 7th OS version – file-based encryption, automatic updates, and Mediaserver hardening.

"We're constantly making improvements to how we identify and protect users from potentially harmful apps," Ludwig said in an interview. [1]

Meanwhile, its biggest competitor, Apple, has also made a few notable security and privacy adjustments on its new iOS 10. [2] Some of the latest security updates on iOS include encryption of the device, enabled Find My iPhone, applied two-factor authentication, limited lockscreen data leakage. The latest mobile OS was pre-built on the company’s new flagship. [3] In a featured post by O2, it mentioned that iOS 10 is the reason “why there’s nothing else like an iPhone.”

While Apple focuses on common user security, Google works on improving their market share in enterprises by offering security features relevant to businesses.

“Google is hoping that its next version, Android N, will finally make network administrators as comfortable with Android devices as those of its rivals,” Cobb said.

What are the important security updates on the latest Google mobile OS? Read on below.

Automatic and seamless updates

The success of the “seamless updates” on the Chrome OS has meant Google has made the feature available on the new Android. [4] It uses two separate system partitions, which makes updating your phone faster and automatic. The first one works as you use your phone daily, while the other one only works when there’s an available system update. This process allows users to use the device while an update runs in the background. The updated version will be automatically applied upon reboot.

Media Server Hardening

To fix the never ending issue on the media server library, Google worked hard to fix the bug and secure the system. So, on the Android N, the company ensured that it got a big overhaul. They have broken up the media server into smaller parts, so it can be updated separately from the full system update. Instead of having to wait six months or more for an update, your phone will automatically receive new patches whenever there’s an available one. This major update makes hacking an Android device even harder that it used to be.

File-level encryption

Previously, Google applied the block-level encryption, which is a secure method as only those who had the right password or PIN could access the storage device. But with the Android N, Google has now applied file-level encryption. It offers two benefits to users. First, it works smoothly on low-end devices, even those with 50 MB/s or lower read and write flash storage hardware. Second, it uses the AEAD (Authenticated Encryption with Associated Data) that strengthens the data security for any unauthorized access of anyone, including apps.

These are the crucial security features on the Android N. Finally, we can see more than just flashy emojis and color scheme updates on a mobile OS. These security enhancements will definitely help protect user data and make the user experience seamless.

Reference:

  1. http://googleforwork.blogspot.com/2016/07/Android-security-to-the-N-th-degree.html
  2. https://www.yahoo.com/tech/ios-10-features-guard-privacy-security-020016187.html
  3. https://www.o2.co.uk/shop/phones/apple/iphone-7/
  4. http://arstechnica.com/gadgets/2016/05/android-n-borrows-chrome-os-code-for-seamless-update-installation/

About Author:

Jl has been a fan of Android devices since G1 appeared in 2008. Now, she follows all the latest development on Google's mobile OS, and has been interviewed several times to impart her knowledge regarding latest system updates. She is now actively working on her launching her own Android-focused blog.

If you'd like to get a true assessment of the architecture and security of your mobile application, please request a FREE Demo. Or, to learn more about TeskaLabs’ SeaCat Mobile Secure Gateway and how we can help you with the security of your mobility solutions, please visit www.teskalabs.com/products/seacat-mobile-secure-gateway.

About the Author

Guest Author

A guest author is an SME of his/her topics or a friend of TeskaLabs.




You Might Be Interested in Reading These Articles

Online Fraud Is Increasing - Is Business Intelligence the Answer?

With the year on year rise in ecommerce, there is a corresponding rise in online fraud - in fact, according to Financial Fraud Action UK, this type of activity had increased by a quarter to £399.5 million in the first half of 2016. The most recent manifestation of this is the concept of “testing” - this is where the criminals try small purchases to check the validity of card details, before moving in for the kill.

Continue reading ...

security

Published on July 04, 2017

Building the Correlator #2: Window architecture

In the previous article, I described what the window correlator is good for, analyzing long series of data to gather security incidents and produce alerts. I also discussed the memory issue that comes with storing long series of data composed of events, which come to the application at a frequency of tens of thousands of events per second. The proposed solution is to store only relevant parts of the series, here called segments, in memory. Now, we'll take a look at the segments in more detail, so we know exactly what structures they are composed of.

Continue reading ...

security development

Published on June 15, 2024

The Security Vulnerability That Puts Millions of Application Backends at Risk. Yours Included

FoxGlove Security researchers published a serious vulnerability that can put millions of application backend, including mobile backend, at risk. Mobile applications use the same web-app technology for their backends, thus suffer the same vulnerability. Mobile application servers are inherently insecure because they consist of extensive stacks of software. Each piece can contain risky zero-day vulnerabilities.

Continue reading ...

mobile security

Published on December 15, 2015