{"id":50702,"date":"2023-02-22T12:27:00","date_gmt":"2023-02-22T12:27:00","guid":{"rendered":"http:\/\/3d8ec72f-7aa8-419b-adb2-0befb007436b"},"modified":"2023-02-22T12:27:00","modified_gmt":"2023-02-22T12:27:00","slug":"this-android-security-risk-is-often-overlooked-google-wants-that-to-change","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/","title":{"rendered":"This Android security risk is often overlooked. Google wants that to change"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b6ae8a6fc6ccfeda2568d71078e3a995f40d0c74\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=768\" alt=\"android-logo-on-a-smartphone-in-front-of-a-google-logo\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/cb88833e9e2e2d202e85a410ec59b3173b8bbb56\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1024\" alt=\"android-logo-on-a-smartphone-in-front-of-a-google-logo\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/564b9b45c5192a5b750b6858ef7f56603b956a79\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280\" alt=\"android-logo-on-a-smartphone-in-front-of-a-google-logo\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/564b9b45c5192a5b750b6858ef7f56603b956a79\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280\" alt=\"android-logo-on-a-smartphone-in-front-of-a-google-logo\" width=\"1280\" height=\"853.75\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty\/SOPA Images<\/span><\/figcaption><\/figure>\n<p>Google is working on improving the cybersecurity of Android smartphones and tablets by hardening the defenses of the entire ecosystem at the firmware level.&nbsp;<\/p>\n<p>Firmware is the computer software behind the configuration and control of a device&#8217;s hardware. Because of this status, firmware is often the first code that runs when a device is switched on, making it the foundation everything else in the system is built upon.<\/p>\n<p>This position means that firmware plays a major role in the security of your device and its operating system, including the configuration of hardware security settings.&nbsp;<\/p>\n<p><strong><strong>Also:&nbsp;<\/strong><\/strong><a href=\"https:\/\/www.zdnet.com\/article\/five-easy-steps-to-keep-your-smartphone-safe-from-hackers\/\" rel=\"follow\"><strong><strong>Five easy steps to keep your smartphone safe from hackers<\/strong><\/strong><\/a><\/p>\n<p>The key role of firmware in managing all aspects of a device means that if an attacker can compromise a smartphone or tablet&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-firmware-attacks-are-on-the-rise-and-you-arent-worrying-about-them-enough\/\" rel=\"follow\">at a firmware level<\/a>, they can gain persistent and almost completely secret access to the device, which could allow them to spy on everything you do, steal sensitive information, or even stop the device from working.&nbsp;<\/p>\n<p>Firmware attacks aren&#8217;t widespread and are <a href=\"https:\/\/www.zdnet.com\/article\/chinese-apt-deploy-moonbounce-malware-in-uefi-firmware\/\" rel=\"follow\">usually highly targeted<\/a>&nbsp;&#8212; but Google is reacting to what it describes as a rise in cybersecurity research that uncovers vulnerabilities in Android firmware.&nbsp;<\/p>\n<p>&#8220;As the security of the Android Platform has been steadily improved, some security researchers have shifted their focus towards other parts of the software stack, including firmware,&#8221; researchers said in a <a href=\"https:\/\/security.googleblog.com\/2023\/02\/hardening-firmware-across-android.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Google Security Blog<\/a> update.&nbsp;<\/p>\n<p>&#8220;Over the last decade there have been numerous publications, talks, Pwn2Own contest winners, and CVEs targeting exploitation of vulnerabilities in firmware running in these secondary processors.&#8221;&nbsp;<\/p>\n<p>Some of these vulnerabilities have resulted in remote-code execution on devices, particularly after abusing Wi-Fi and cellular baseband bugs.&nbsp;<\/p>\n<p>Now Google says it will improve Android security by applying lessons learned from securing other areas of the code and hardening the firmware to protect it &#8212; and users &#8212; against potential cyber threats.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/googles-hackers-inside-the-cybersecurity-red-team-that-keeps-google-safe\/\" rel=\"follow\"><strong>Inside the cybersecurity red team that keeps Google safe<\/strong><\/a><\/p>\n<p>This process will involve improvements to compiler-based sanitizers &#8212; programming tool that detect computer program bugs &#8212; and other exploit mitigations in the firmware, along with improvements to memory safety features. The improvements to memory will look to prevent attacks that directly target the memory of the firmware, such as buffer-overflow attacks.<\/p>\n<p>There are challenges surrounding the implementation of this approach, as Google notes.<\/p>\n<p>&#8220;Hardening firmware running on bare metal to materially increase the level of protection &#8212; across more surfaces in Android &#8212; is one of the priorities of Android Security,&#8221; said Google Security, which also wants other Android device manufacturers to follow suit.<\/p>\n<p>&#8220;Moving forward, our goal is to expand the use of these mitigation technologies for more bare metal targets, and we strongly encourage our partners to do the same. We stand ready to assist our ecosystem partners to harden bare metal firmware.&#8221;<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/this-threat-to-android-security-is-often-overlooked-google-wants-to-change-that\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s been an increase in cyberattacks targeting Android smartphone firmware. Google has a plan to improve defenses.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-50702","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Android security risk is often overlooked. Google wants that to change 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Android security risk is often overlooked. Google wants that to change 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-22T12:27:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/564b9b45c5192a5b750b6858ef7f56603b956a79\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Android security risk is often overlooked. Google wants that to change\",\"datePublished\":\"2023-02-22T12:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/564b9b45c5192a5b750b6858ef7f56603b956a79\\\/2023\\\/02\\\/22\\\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\\\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/\",\"name\":\"This Android security risk is often overlooked. Google wants that to change 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/564b9b45c5192a5b750b6858ef7f56603b956a79\\\/2023\\\/02\\\/22\\\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\\\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-02-22T12:27:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/564b9b45c5192a5b750b6858ef7f56603b956a79\\\/2023\\\/02\\\/22\\\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\\\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/564b9b45c5192a5b750b6858ef7f56603b956a79\\\/2023\\\/02\\\/22\\\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\\\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This Android security risk is often overlooked. Google wants that to change\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Android security risk is often overlooked. Google wants that to change 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/","og_locale":"en_US","og_type":"article","og_title":"This Android security risk is often overlooked. Google wants that to change 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-02-22T12:27:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/564b9b45c5192a5b750b6858ef7f56603b956a79\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Android security risk is often overlooked. Google wants that to change","datePublished":"2023-02-22T12:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/"},"wordCount":498,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/564b9b45c5192a5b750b6858ef7f56603b956a79\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/","url":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/","name":"This Android security risk is often overlooked. Google wants that to change 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/564b9b45c5192a5b750b6858ef7f56603b956a79\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280","datePublished":"2023-02-22T12:27:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/564b9b45c5192a5b750b6858ef7f56603b956a79\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/564b9b45c5192a5b750b6858ef7f56603b956a79\/2023\/02\/22\/d02b8d9f-6d32-4600-bc71-b01b446d0e91\/android-logo-on-a-smartphone-in-front-of-a-google-logo.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-android-security-risk-is-often-overlooked-google-wants-that-to-change\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"This Android security risk is often overlooked. Google wants that to change"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50702"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50702\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}