Android Nougat: Google OS' Tightest Security Yet
This article is exclusively written for TeskaLabs by J’s Tech Journal
Officially released a month ago, the latest Google mobile OS version has made a few major adjustments, particularly in its security features. The search giant has improved the security in the Android Nougat (or also known as Android N) from strengthening the Android itself to some tools that helps developers to keep things as it is while users install apps.
Adrian Ludwig, head of the Android security team, highlighted three key security features on the 7th OS version – file-based encryption, automatic updates, and Mediaserver hardening.
"We're constantly making improvements to how we identify and protect users from potentially harmful apps," Ludwig said in an interview. [1]
Meanwhile, its biggest competitor, Apple, has also made a few notable security and privacy adjustments on its new iOS 10. [2] Some of the latest security updates on iOS include encryption of the device, enabled Find My iPhone, applied two-factor authentication, limited lockscreen data leakage. The latest mobile OS was pre-built on the company’s new flagship. [3] In a featured post by O2, it mentioned that iOS 10 is the reason “why there’s nothing else like an iPhone.”
While Apple focuses on common user security, Google works on improving their market share in enterprises by offering security features relevant to businesses.
“Google is hoping that its next version, Android N, will finally make network administrators as comfortable with Android devices as those of its rivals,” Cobb said.
What are the important security updates on the latest Google mobile OS? Read on below.
Automatic and seamless updates
The success of the “seamless updates” on the Chrome OS has meant Google has made the feature available on the new Android. [4] It uses two separate system partitions, which makes updating your phone faster and automatic. The first one works as you use your phone daily, while the other one only works when there’s an available system update. This process allows users to use the device while an update runs in the background. The updated version will be automatically applied upon reboot.
Media Server Hardening
To fix the never ending issue on the media server library, Google worked hard to fix the bug and secure the system. So, on the Android N, the company ensured that it got a big overhaul. They have broken up the media server into smaller parts, so it can be updated separately from the full system update. Instead of having to wait six months or more for an update, your phone will automatically receive new patches whenever there’s an available one. This major update makes hacking an Android device even harder that it used to be.
File-level encryption
Previously, Google applied the block-level encryption, which is a secure method as only those who had the right password or PIN could access the storage device. But with the Android N, Google has now applied file-level encryption. It offers two benefits to users. First, it works smoothly on low-end devices, even those with 50 MB/s or lower read and write flash storage hardware. Second, it uses the AEAD (Authenticated Encryption with Associated Data) that strengthens the data security for any unauthorized access of anyone, including apps.
These are the crucial security features on the Android N. Finally, we can see more than just flashy emojis and color scheme updates on a mobile OS. These security enhancements will definitely help protect user data and make the user experience seamless.
Reference:
- http://googleforwork.blogspot.com/2016/07/Android-security-to-the-N-th-degree.html
- https://www.yahoo.com/tech/ios-10-features-guard-privacy-security-020016187.html
- https://www.o2.co.uk/shop/phones/apple/iphone-7/
- http://arstechnica.com/gadgets/2016/05/android-n-borrows-chrome-os-code-for-seamless-update-installation/
About Author:
Jl has been a fan of Android devices since G1 appeared in 2008. Now, she follows all the latest development on Google's mobile OS, and has been interviewed several times to impart her knowledge regarding latest system updates. She is now actively working on her launching her own Android-focused blog.
If you'd like to get a true assessment of the architecture and security of your mobile application, please request a FREE Demo. Or, to learn more about TeskaLabs’ SeaCat Mobile Secure Gateway and how we can help you with the security of your mobility solutions, please visit www.teskalabs.com/products/seacat-mobile-secure-gateway.
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
Key Areas and Best Practices to Focus for Mobile API Security
With APIs (Application Programming Interfaces) becoming a crucial factor in any web or mobile application, security feels more like a journey than a destination. Of all the constituents that encompass an application, API gateway offers easy access points for a hacker to break in and steal your data. A single error in API can cause immense problems for any organization using your API.
Published on November 22, 2016
CatVision.io App available in Google Play
A few months ago we introduced CatVision.io SDK for Android, a developer kit which provides an easy and secure remote access to a screen of your mobile application. In January 2018 it was followed by CatVision.io SDK for iOS.
google play
android
app
launch
screen-share
Published on February 21, 2018
MazelTov and the Russian Underground Have It Going for Your Android Devices. But Not for Good Reasons
The Internet has been a good place for individuals and businesses. However, it's fast-becoming a leading medium for criminals in this cyber war against people like you and I. One example is the Russian underground that sell anything to do with cyber crime. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents.
Published on May 19, 2015