<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~d/styles/atom10full.xsl"?><?xml-stylesheet type="text/css" media="screen" href="http://feeds.feedburner.com/~d/styles/itemcontent.css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0"><id>tag:blogger.com,1999:blog-1176949257541686127</id><updated>2017-07-21T23:58:44.828-07:00</updated><title type="text">Google Online Security Blog</title><subtitle type="html">The latest news and insights from Google on security and safety on the Internet.</subtitle><link rel="alternate" type="text/html" href="http://security.googleblog.com/" /><link rel="next" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" /><author><name>Niels</name><uri>http://www.blogger.com/profile/08196592565944651976</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><generator version="7.00" uri="http://www.blogger.com">Blogger</generator><openSearch:totalResults>253</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/atom+xml" href="http://feeds.feedburner.com/GoogleOnlineSecurityBlog" /><feedburner:info uri="googleonlinesecurityblog" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://pubsubhubbub.appspot.com/" /><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-8544909904287782730</id><published>2017-07-20T11:19:00.002-07:00</published><updated>2017-07-20T11:19:53.816-07:00</updated><title type="text">Final removal of trust in WoSign and StartCom Certificates</title><content type="html">&lt;span class="byline-author"&gt;Posted by Andrew Whalley and Devon O'Brien, Chrome Security&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As &lt;a href="https://security.googleblog.com/2016/10/distrusting-wosign-and-startcom.html"&gt;previously announced&lt;/a&gt;, Chrome has been in the process of removing trust from certificates issued by the CA WoSign and its subsidiary StartCom, as a result of several incidents not in keeping with the high standards expected of CAs.&lt;br /&gt;&lt;br /&gt;We started the phase out in Chrome 56 by only trusting certificates issued prior to October 21st 2016, and subsequently restricted trust to a set of whitelisted hostnames based on the Alexa Top 1M. We have been reducing the size of the whitelist over the course of several Chrome releases.&lt;br /&gt;&lt;br /&gt;Beginning with Chrome 61, the whitelist will be removed, resulting in full distrust of the existing WoSign and StartCom root certificates and all certificates they have issued.&lt;br /&gt;&lt;br /&gt;Based on the &lt;a href="https://www.chromium.org/developers/calendar"&gt;Chromium Development Calendar&lt;/a&gt;, this change is visible in the &lt;a href="https://www.chromium.org/getting-involved/dev-channel"&gt;Chrome Dev channel&lt;/a&gt; now, the Chrome Beta channel around late July 2017, and will be released to Stable around mid September 2017.&lt;br /&gt;&lt;br /&gt;Sites still using StartCom or WoSign-issued certificates should consider replacing these certificates as a matter of urgency to minimize disruption for Chrome users. &lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=uzY4LRDBcNc:K7rXT3J5M8U:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=uzY4LRDBcNc:K7rXT3J5M8U:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=uzY4LRDBcNc:K7rXT3J5M8U:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/uzY4LRDBcNc" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/8544909904287782730/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=8544909904287782730&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8544909904287782730" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8544909904287782730" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/uzY4LRDBcNc/final-removal-of-trust-in-wosign-and.html" title="Final removal of trust in WoSign and StartCom Certificates" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/07/final-removal-of-trust-in-wosign-and.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-4762462556199143698</id><published>2017-07-12T10:08:00.001-07:00</published><updated>2017-07-12T10:08:36.542-07:00</updated><title type="text">Identifying Intrusive Mobile Apps Using Peer Group Analysis</title><content type="html">&lt;span class="byline-author"&gt;Posted by Martin Pelikan, Giles Hogben, and Ulfar Erlingsson of Google’s Security and Privacy team&lt;/span&gt;&lt;br /&gt;Mobile apps entertain and assist us, make it easy to communicate with friends and family, and provide tools ranging from maps to electronic wallets. But these apps could also seek more device information than they need to do their job, such as personal data and sensor data from components, like cameras and GPS trackers.&lt;br /&gt;&lt;br /&gt;To protect our users and help developers navigate this complex environment, Google analyzes privacy and security signals for each app in Google Play. We then compare that app to other apps with similar features, known as functional peers. Creating peer groups allows us to calibrate our estimates of users’ expectations and set adequate boundaries of behaviors that may be considered unsafe or intrusive. This process helps detect apps that collect or send sensitive data without a clear need, and makes it easier for users to find apps that provide the right functionality and respect their privacy. For example, most coloring book apps don’t need to know a user’s precise location to function and this can be established by analyzing other coloring book apps. By contrast, mapping and navigation apps need to know a user’s location, and often require GPS sensor access.&lt;br /&gt;&lt;br /&gt;One way to create app peer groups is to create a fixed set of categories and then assign each app into one or more categories, such as tools, productivity, and games. However, fixed categories are too coarse and inflexible to capture and track the many distinctions in the rapidly changing set of mobile apps. Manual curation and maintenance of such categories is also a tedious and error-prone task.&lt;br /&gt;&lt;br /&gt;To address this, Google developed a machine-learning algorithm for clustering mobile apps with similar capabilities. Our approach uses deep learning of vector embeddings to identify peer groups of apps with similar functionality, using app metadata, such as text descriptions, and user metrics, such as installs. Then peer groups are used to identify anomalous, potentially harmful signals related to privacy and security, from each app’s requested permissions and its observed behaviors. The correlation between different peer groups and their security signals helps different teams at Google decide which apps to promote and determine which apps deserve a more careful look by our security and privacy experts. We also use the result to help app developers improve the privacy and security of their apps.&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;span id="docs-internal-guid-6bb3be1b-37c0-77c4-8ce2-8f7e4caf1880"&gt;&lt;span style="font-family: Roboto; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;"&gt;&lt;img alt="[UNSET] (27).png" height="345" src="https://lh5.googleusercontent.com/CR_TnXcPF5OVJNbGvw6TS6DPuKGuS68wJAEppBZgbISVSgiuWKzrJlUfgSk7oZoJJlpXvBr6tFrcSiJn2hqZYZlcve9RSHgmnuh8hwpr0Yd9idiLdtWktk5qIuO4rzWYdprdZyBU" style="border: none; transform: rotate(0rad);" width="624" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;i&gt;Apps are split into groups of similar functionality, and in each cluster of similar apps the established baseline is used to find anomalous privacy and security signals.&lt;/i&gt;&lt;/div&gt;&lt;br /&gt;These techniques build upon earlier ideas, such as using &lt;a href="https://arxiv.org/abs/1605.08797"&gt;peer groups&lt;/a&gt; to analyze privacy-related signals, &lt;a href="http://papers.nips.cc/paper/5021-distributed-representations-of-words-and-phrases-and-their-compositionality"&gt;deep learning for language models&lt;/a&gt; to make those peer groups better, and &lt;a href="https://arxiv.org/abs/1605.08797"&gt;automated data analysis&lt;/a&gt; to draw conclusions.&lt;br /&gt;&lt;br /&gt;Many teams across Google collaborated to create this algorithm and the surrounding process. Thanks to several, essential team members including Andrew Ahn, Vikas Arora, Hongji Bao, Jun Hong, Nwokedi Idika, Iulia Ion, Suman Jana, Daehwan Kim, Kenny Lim, Jiahui Liu, Sai Teja Peddinti, Sebastian Porst, Gowdy Rajappan, Aaron Rothman, Monir Sharif, Sooel Son, Michael Vrable, and Qiang Yan.&lt;br /&gt;&lt;br /&gt;For more information on Google’s efforts to detect and fight potentially harmful apps (PHAs) on Android, see &lt;a href="https://source.android.com/security/reports/Google_Android_Security_PHA_classifications.pdf"&gt;Google Android Security Team’s Classifications for Potentially Harmful Applications&lt;/a&gt;.&lt;br /&gt;&lt;b&gt;References&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;S. Jana, Ú. Erlingsson, I. Ion (2015). &lt;a href="https://arxiv.org/abs/1510.07308"&gt;Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis&lt;/a&gt;. arXiv:1510.07308 [cs.CR].&lt;br /&gt;&lt;br /&gt;T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, J. Dean (2013). &lt;a href="http://papers.nips.cc/paper/5021-distributed-representations-of-words-and-phrases-and-their-compositionality"&gt;Distributed Representations of Words and Phrases and their Compositionality&lt;/a&gt;. Advances in Neural Information Processing Systems 26 (NIPS 2013).&lt;br /&gt;&lt;br /&gt;Ú. Erlingsson (2016). &lt;a href="https://arxiv.org/abs/1605.08797"&gt;Data-driven software security: Models and methods&lt;/a&gt;. Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF'16), Lisboa, Portugal.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=XwHKFbk8xyI:MeellaRSIZ0:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=XwHKFbk8xyI:MeellaRSIZ0:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=XwHKFbk8xyI:MeellaRSIZ0:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/XwHKFbk8xyI" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/4762462556199143698/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=4762462556199143698&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4762462556199143698" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4762462556199143698" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/XwHKFbk8xyI/identifying-intrusive-mobile-apps-using.html" title="Identifying Intrusive Mobile Apps Using Peer Group Analysis" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/07/identifying-intrusive-mobile-apps-using.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-4115944770794771537</id><published>2017-06-09T09:32:00.000-07:00</published><updated>2017-06-09T09:32:35.909-07:00</updated><title type="text">Making the Internet safer and faster: Introducing reCAPTCHA Android API</title><content type="html">&lt;span class="byline-author"&gt;Posted by Wei Liu,&amp;nbsp;Product Manager, reCAPTCHA&lt;/span&gt;&lt;br /&gt;When we launched reCAPTCHA ten years ago, we had a simple goal: enable users to visit the sites they love without worrying about spam and abuse. Over the years, reCAPTCHA has changed quite a bit. It evolved from the distorted text to &lt;a href="https://security.googleblog.com/2014/04/street-view-and-recaptcha-technology.html"&gt;street numbers&lt;/a&gt; and names, then &lt;a href="https://security.googleblog.com/2014/12/are-you-robot-introducing-no-captcha.html"&gt;No CAPTCHA reCAPTCHA&lt;/a&gt; in 2014 and Invisible reCAPTCHA in March this year.&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;span id="docs-internal-guid-a34ad6eb-8d94-080e-fd59-544f2a7d7dba"&gt;&lt;span style="font-family: &amp;quot;roboto&amp;quot;; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;"&gt;&lt;img alt="ezgif.com-gif-maker (3).gif" height="87" src="https://lh6.googleusercontent.com/PIeVkciHicY35WDK_iMpCAHFaZkOPUyTb6M9OlMBp034WMJZ5W7_Fa5d6JSqN_vEmb8-2KaOcDttt7wvWbPfD5GNrnSthYnA_ebsApIQ_Fv_vhZFMP2-oVlVSXCPYWf2Ul1SIJFP" style="border: none; transform: rotate(0rad);" width="262" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;By now, more than a billion users have benefited from reCAPTCHA and we continue to work to refine our protections.&lt;br /&gt;&lt;br /&gt;reCAPTCHA protects users wherever they may be online. As the use of mobile devices has grown rapidly, it’s important to keep the mobile applications and data safe. Today, on reCAPTCHA’s tenth birthday, we’re glad to announce the first reCAPTCHA &lt;a href="https://developer.android.com/training/safetynet/recaptcha.html"&gt;Android API&lt;/a&gt; as part of Google Play Services.&lt;br /&gt;&lt;br /&gt;With this API, reCAPTCHA can better tell human and bots apart to provide a streamlined user experience on mobile. It will use our newest Invisible reCAPTCHA technology, which runs risk analysis behind the scene and has enabled millions of human users to pass through with zero click everyday. Now mobile users can enjoy their apps without being interrupted, while still staying away from spam and abuse.&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;div style="text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-YpJIJGxke9k/WTlxU0sBedI/AAAAAAAACKE/Ra-FjlxlWqIjExiGklL55eFUUG-ojZEYgCLcB/s1600/recaptcha2.gif" imageanchor="1" style="color: #4184f3; font-family: Roboto, sans-serif; font-size: 17px; text-align: start; text-decoration: none;" target="_blank"&gt;&lt;img border="0" data-original-height="1136" data-original-width="640" height="640" src="https://4.bp.blogspot.com/-YpJIJGxke9k/WTlxU0sBedI/AAAAAAAACKE/Ra-FjlxlWqIjExiGklL55eFUUG-ojZEYgCLcB/s640/recaptcha2.gif" style="border: none; height: auto; margin: 30px 0px 20px; max-width: 100%; position: relative; width: auto;" width="360" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;reCAPTCHA Android API is included with Google &lt;a href="https://developer.android.com/training/safetynet/index.html"&gt;SafetyNet&lt;/a&gt;, which provides services like device attestation and safe browsing to protect mobile apps. Mobile developers can do both the device and user attestations in the same API to mitigate security risks of their apps more efficiently. This adds to the &lt;a href="https://security.googleblog.com/2017/03/diverse-protections-for-diverse.html"&gt;diversity of security protections&lt;/a&gt; on Android: &lt;a href="https://blog.google/products/android/google-play-protect/"&gt;Google Play Protect&lt;/a&gt; to monitor for potentially harmful applications, device encryption, and regular security updates. Please &lt;a href="https://developers.google.com/recaptcha/docs/versions"&gt;visit our site&lt;/a&gt; to learn more about how to integrate with the reCAPTCHA Android API, and keep an eye out for our iOS library.&lt;br /&gt;&lt;br /&gt;The journey of reCAPTCHA continues: we’ll make the Internet safer and easier to use for everyone (except bots).&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=xhcftfmwlmc:G-9TuhltAhs:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=xhcftfmwlmc:G-9TuhltAhs:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=xhcftfmwlmc:G-9TuhltAhs:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/xhcftfmwlmc" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/4115944770794771537/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=4115944770794771537&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4115944770794771537" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4115944770794771537" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/xhcftfmwlmc/making-internet-safer-and-faster.html" title="Making the Internet safer and faster: Introducing reCAPTCHA Android API" /><author><name>Aaron Stein</name><uri>http://www.blogger.com/profile/15108814150912902439</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-YpJIJGxke9k/WTlxU0sBedI/AAAAAAAACKE/Ra-FjlxlWqIjExiGklL55eFUUG-ojZEYgCLcB/s72-c/recaptcha2.gif" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/06/making-internet-safer-and-faster.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-2814534460307949956</id><published>2017-06-02T13:47:00.001-07:00</published><updated>2017-06-02T14:29:19.418-07:00</updated><title type="text">Announcing Google Capture the Flag 2017</title><content type="html">&lt;span class="byline-author"&gt;Posted by Josh Armour Security Program Manager&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;On 00:00:01 UTC of June 17th and 18th, 2017 we’ll be hosting the &lt;a href="https://g.co/ctf"&gt;online qualification round&lt;/a&gt; of our second annual Capture The Flag (CTF) competition. In a ‘Capture the Flag’ competition we create security challenges and puzzles in which contestants can earn points for solving them. We will be inviting the top 10 finalist teams to a &lt;i&gt;secret undisclosed location&lt;/i&gt; (spoiler alert: &lt;a href="https://www.google.com/intl/en/about/locations/?region=*"&gt;it’s Google&lt;/a&gt;) to compete onsite for a prize pool of over USD$31,337 and we’ll help subsidize travel to the venue for the finals to four participants for each of the ten finalist teams. In addition to grand prizes given at the finals, we’ll be rewarding some of the best and creative &lt;a href="https://github.com/ctfs/write-ups-2016/tree/master/google-ctf-2016#google-ctf-2016-write-ups"&gt;write-ups&lt;/a&gt; that we receive during the qualifying round. We want to give you an opportunity to share with the world the clever way you solve challenges.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Why do we host these competitions?&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;There are three main reasons why we host these competitions.&lt;br /&gt;&lt;br /&gt;First, as we've seen with our &lt;a href="http://g.co/vrp"&gt;Vulnerability Reward Program&lt;/a&gt;, the security community’s efforts help us better protect Google users, and the web as a whole. We’d like to give the people who solve a single challenge or two in a very clever way a chance to teach us and the security community, even if they don’t qualify for the finals. We also think that these challenges allows us to share with the world the types of problems our security team works on every day.&lt;br /&gt;&lt;br /&gt;Second, we want to engage the broader security community and reach out to as many people involved as possible. At the &lt;a href="https://ctftime.org/event/303"&gt;Google CTF&lt;/a&gt; last year the winning team, ‘&lt;a href="https://ctftime.org/team/6965"&gt;Pasten&lt;/a&gt;’ from Israel, earned over 4,700 points competing against 2,400 teams out of which 900 were able to solve at least one of our challenges. Thanks to the community's feedback, we used what we learned last year to make our CTF even better this time.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-k37X_EGCea4/WTHYjoeH1FI/AAAAAAAAAfg/icMT3ufoF2MWNFcvxnzRpqzy_NwWVs1vgCLcB/s1600/Screenshot%2B2017-06-02%2Bat%2B23.09.11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="489" data-original-width="1600" height="195" src="https://1.bp.blogspot.com/-k37X_EGCea4/WTHYjoeH1FI/AAAAAAAAAfg/icMT3ufoF2MWNFcvxnzRpqzy_NwWVs1vgCLcB/s640/Screenshot%2B2017-06-02%2Bat%2B23.09.11.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;Lastly, we also want to grow the security community. Upon observing how last year's competition engaged new players from all over the world, we want to continue to create a safe space for people to come and learn while trying to solve challenges and having fun. Our internal security team employs several people who actively compete in CTF competitions in their spare time, so we value this activity and want to give back to and help grow our community.&lt;br /&gt;&lt;br /&gt;We hope to virtually see you at the 2nd annual Google CTF on June 17th at 00:00:01 UTC. Check &lt;a href="http://g.co/ctf"&gt;this site (g.co/ctf)&lt;/a&gt; for more details, as they become available.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;The Big Picture&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;At Google, we aim to reward the hard work of hackers and security researchers. One such avenue is our Google Vulnerability Rewards Programs. Many of the best bug hunters enjoy participating in ‘Capture The Flag’ contests, and great vulnerabilities have been discovered and &lt;a href="https://hackernoon.com/capturing-all-the-flags-in-bsidessf-ctf-by-pwning-our-infrastructure-3570b99b4dd0"&gt;disclosed at them&lt;/a&gt;. During last year's Google CTF we also received some security bug reports in our scoreboard, for which we gave out rewards under the VRP. Another way we reward this community is with our &lt;a href="https://www.google.com/about/appsecurity/research-grants/"&gt;Vulnerability Research Grants Program&lt;/a&gt; and our &lt;a href="http://g.co/prp"&gt;Patch Rewards Program&lt;/a&gt;. We look forward to the best contestants taking some time to explore our other programs for opportunities to make some money and help improve the security of the internet.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=U9sVuzzhmyQ:if0hWk7vyts:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=U9sVuzzhmyQ:if0hWk7vyts:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=U9sVuzzhmyQ:if0hWk7vyts:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/U9sVuzzhmyQ" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/2814534460307949956/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=2814534460307949956&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/2814534460307949956" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/2814534460307949956" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/U9sVuzzhmyQ/announcing-google-capture-flag-2017.html" title="Announcing Google Capture the Flag 2017" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-k37X_EGCea4/WTHYjoeH1FI/AAAAAAAAAfg/icMT3ufoF2MWNFcvxnzRpqzy_NwWVs1vgCLcB/s72-c/Screenshot%2B2017-06-02%2Bat%2B23.09.11.png" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/06/announcing-google-capture-flag-2017.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-1409767660287276065</id><published>2017-06-01T09:18:00.001-07:00</published><updated>2017-06-01T09:18:01.810-07:00</updated><title type="text">2017 Android Security Rewards</title><content type="html">&lt;span class="byline-author"&gt;Posted by Mayank Jain and Scott Roberts, Android Security team&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;[Cross-posted from the &lt;a href="https://android-developers.googleblog.com/2017/06/2017-android-security-rewards.html"&gt;Android Developers Blog&lt;/a&gt;]&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Two years ago, we launched the &lt;a href="https://www.google.com/about/appsecurity/android-rewards/"&gt;Android Security Rewards program&lt;/a&gt;. In its second year, we've seen great progress. We received over 450 qualifying vulnerability reports from researchers and the average pay per researcher jumped by 52.3%. On top of that, the total Android Security Rewards payout doubled to $1.1 million dollars. Since it launched, we've rewarded researchers over $1.5 million dollars.&lt;br /&gt;&lt;br /&gt;Here are some of the highlights from the Android Security Rewards program's second year:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;There were no payouts for the top reward for a complete remote exploit chain leading to TrustZone or Verified Boot compromise, our highest award amount possible.&lt;/li&gt;&lt;li&gt;We paid 115 individuals with an average of $2,150 per reward and $10,209 per researcher.&lt;/li&gt;&lt;li&gt;We paid our top research team, &lt;a href="http://c0reteam.org/"&gt;C0RE Team&lt;/a&gt;, over $300,000 for 118 vulnerability reports.&lt;/li&gt;&lt;li&gt;We paid 31 researchers $10,000 or more.&lt;/li&gt;&lt;/ul&gt;Thank you to all the amazing &lt;a href="https://source.android.com/security/overview/acknowledgements"&gt;researchers&lt;/a&gt; who submitted complete &lt;a href="https://source.android.com/security/overview/updates-resources#report-issues"&gt;vulnerability reports&lt;/a&gt; to us last year.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Improvements to Android Security Rewards program&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;We’re constantly working to improve the Android Security Rewards program and today we’re making a few changes to all vulnerability reports filed after June 1, 2017.&lt;br /&gt;&lt;br /&gt;Because every Android release includes more security protections and no researcher has claimed the top reward for an exploit chains in 2 years, we’re excited to increase our top-line payouts for these exploits.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Rewards for a remote exploit chain or exploit leading to TrustZone or Verified Boot compromise increase from $50,000 to $200,000.&lt;/li&gt;&lt;li&gt;Rewards for a remote kernel exploit increase from $30,000 to $150,000.&lt;/li&gt;&lt;/ul&gt;In addition to rewarding for vulnerabilities, we continue to work with the broad and diverse Android ecosystem to protect users from issues reported through our program. We collaborate with manufacturers to ensure that these issues are fixed on their devices through monthly &lt;a href="https://source.android.com/security/bulletin/"&gt;security updates&lt;/a&gt;. Over 100 device models have a majority of their deployed devices running a security update from the last 90 days. This table shows the models with a majority of deployed devices running a security update from the last two months:&lt;br /&gt;&lt;br /&gt;&lt;div dir="ltr" style="margin-left: 0pt;"&gt;&lt;table style="border-collapse: collapse; border: none;"&gt;&lt;colgroup&gt;&lt;col width="159"&gt;&lt;/col&gt;&lt;col width="465"&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;tbody&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="background-color: #f3f3f3; border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Manufacturer &lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="background-color: #f3f3f3; border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 5pt 5pt 5pt 5pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Device &lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;BlackBerry&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;PRIV&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Fujitsu&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;F-01J&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;General Mobile&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;GM5 Plus d, GM5 Plus, General Mobile 4G Dual, General Mobile 4G&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Gionee&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;A1&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Google&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Pixel XL, Pixel, Nexus 6P, Nexus 6, Nexus 5X, Nexus 9&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;LGE&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;LG G6, V20, Stylo 2 V, GPAD 7.0 LTE&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Motorola&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Moto Z, Moto Z Droid&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Oppo&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;CPH1613, CPH1605&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Samsung&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Galaxy S8+, Galaxy S8, Galaxy S7, Galaxy S7 Edge, Galaxy S7 Active, Galaxy S6 Active, Galaxy S5 Dual SIM, Galaxy C9 Pro, Galaxy C7, Galaxy J7, Galaxy On7 Pro, Galaxy J2, Galaxy A8, Galaxy Tab S2 9.7&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Sharp&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Android One S1, 507SH&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Sony&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Xperia XA1, Xperia X&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 0pt;"&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Vivo&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;td style="border-bottom: solid #999999 1pt; border-left: solid #999999 1pt; border-right: solid #999999 1pt; border-top: solid #999999 1pt; padding: 7.2pt 7.2pt 7.2pt 7.2pt; vertical-align: middle;"&gt;&lt;div dir="ltr" style="line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: transparent; color: black; font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;Vivo 1609, Vivo 1601, Vivo Y55&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;span id="docs-internal-guid-4bf0893f-6463-082a-d26d-452b8a018f43"&gt;&lt;span style="font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;"&gt;Source&lt;/span&gt;&lt;span style="font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; vertical-align: baseline; white-space: pre-wrap;"&gt;: Google, May 29, 2017&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;roboto&amp;quot;; font-size: 10pt; vertical-align: baseline; white-space: pre-wrap;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="vertical-align: baseline; white-space: pre-wrap;"&gt;Thank you to everyone who helped make Android safer and stronger in the past year. Together, we made a huge investment in security research that helps Android users everywhere. If you want to get involved to make next year even better, check out our detailed &lt;a href="https://www.google.com/about/appsecurity/android-rewards/"&gt;Program Rules&lt;/a&gt;. For tips on how to submit complete reports, see &lt;a href="https://sites.google.com/site/bughunteruniversity/improve/how-to-submit-an-android-platform-bug-report"&gt;Bug Hunter University&lt;/a&gt;.&lt;/span&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=67cfij-2Pdg:C1lEMGCWn5k:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=67cfij-2Pdg:C1lEMGCWn5k:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=67cfij-2Pdg:C1lEMGCWn5k:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/67cfij-2Pdg" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/1409767660287276065/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=1409767660287276065&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/1409767660287276065" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/1409767660287276065" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/67cfij-2Pdg/2017-android-security-rewards.html" title="2017 Android Security Rewards" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/06/2017-android-security-rewards.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-6159722990046726942</id><published>2017-05-31T10:03:00.000-07:00</published><updated>2017-05-31T10:03:07.130-07:00</updated><title type="text">New Built-In Gmail Protections to Combat Malware in Attachments</title><content type="html">&lt;span class="byline-author"&gt;Posted by Sri Somanchi, Product Manager, Gmail anti-spam&lt;/span&gt;&lt;br /&gt;Today we announced &lt;a href="https://www.blog.google/products/g-suite/keeping-your-company-data-safe-new-security-updates-gmail"&gt;new security features for Gmail customers&lt;/a&gt;, including early phishing detection using machine learning, click-time warnings for malicious links, and unintended external reply warnings. In addition, we have also updated our defenses against malicious attachments.&lt;br /&gt;&lt;br /&gt;Let’s take a deeper look at the new defenses against malicious attachments. We now correlate spam signals with attachment and sender heuristics, to predict messages containing new and unseen malware variants. These protections enable Gmail to better protect our users from zero-day threats, ransomware and polymorphic malware.&lt;br /&gt;&lt;br /&gt;In addition, we &lt;a href="https://support.google.com/mail/answer/6590#messageswattachments"&gt;block&lt;/a&gt; use of file types that carry a high potential for security risks including executable and javascript files.&lt;br /&gt;&lt;br /&gt;Machine learning has helped Gmail achieve more than 99% accuracy in spam detection, and with these new protections, we’re able to reduce your exposure to threats by confidently rejecting hundreds of millions of additional messages every day.&lt;br /&gt;&lt;b&gt;Constantly improving our automatic protections&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;These new changes are just the latest in our ongoing work to improve our protections as we work to keep ahead of evolving threats. For many years, scammers have tried to use dodgy email attachments to sneak past our spam filters, and we’ve long blocked this potential abuse in a variety of &lt;a href="https://support.google.com/mail/answer/25760"&gt;ways&lt;/a&gt;, including:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Rejecting the message and notifying the sender if we detect a virus in an email.&lt;/li&gt;&lt;li&gt;Preventing you from sending a message with an infected attachment.&lt;/li&gt;&lt;li&gt;Preventing you from downloading attachments if we detect a virus.&lt;/li&gt;&lt;/ul&gt;While the bad guys never rest, neither do we.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;These protections were made possible due to extensive contribution from Vijay Eranti &amp;amp; Timothy Schumacher (Gmail anti-spam) &amp;amp; Harish Gudelly (Google anti-virus) &amp;amp; Lucio Tudisco (G Suite anti-abuse)&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=UT--FXRLZ4I:92rj3wwhvxY:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=UT--FXRLZ4I:92rj3wwhvxY:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=UT--FXRLZ4I:92rj3wwhvxY:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/UT--FXRLZ4I" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/6159722990046726942/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=6159722990046726942&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/6159722990046726942" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/6159722990046726942" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/UT--FXRLZ4I/new-built-in-gmail-protections-to.html" title="New Built-In Gmail Protections to Combat Malware in Attachments" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/05/new-built-in-gmail-protections-to.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-509193856334617477</id><published>2017-05-08T09:18:00.000-07:00</published><updated>2017-05-08T09:18:28.070-07:00</updated><title type="text">OSS-Fuzz: Five months later, and rewarding projects</title><content type="html">&lt;span class="byline-author"&gt;Posted by Oliver Chang, Abhishek Arya (Security Engineers, Chrome Security), Kostya Serebryany (Software Engineer, Dynamic Tools), and Josh Armour (Security Program Manager)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Five months ago, we &lt;a href="https://opensource.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html"&gt;announced&lt;/a&gt; &lt;a href="https://github.com/google/oss-fuzz/"&gt;OSS-Fuzz&lt;/a&gt;, Google’s effort to help make open source software more secure and stable. Since then, our robot army has been working hard at &lt;a href="https://en.wikipedia.org/wiki/Fuzzing"&gt;fuzzing&lt;/a&gt;, processing 10 trillion test inputs a day. Thanks to the efforts of the open source community who have integrated a total of &lt;a href="https://github.com/google/oss-fuzz/tree/master/projects"&gt;47&lt;/a&gt; projects, we’ve found over &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=-component%3AInfra+status%3ANew%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;1,000&lt;/a&gt; bugs (&lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=-component%3AInfra+status%3ANew%2CFixed%2CVerified+Type%3DBug-Security+&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;264&lt;/a&gt; of which are potential security vulnerabilities).&lt;br /&gt;&lt;br /&gt;&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-0JD6IhtCvu8/WRCYuY1z-FI/AAAAAAAAAeo/HuZLIK1r6zYEYTQ9mTYb0y7qo5gVbHurQCLcB/s1600/chart.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="371" src="https://4.bp.blogspot.com/-0JD6IhtCvu8/WRCYuY1z-FI/AAAAAAAAAeo/HuZLIK1r6zYEYTQ9mTYb0y7qo5gVbHurQCLcB/s640/chart.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span id="docs-internal-guid-18e4bd2c-e8d4-baeb-15dd-713cc01ed38b"&gt;&lt;span style="font-family: Arial; font-size: 11pt; vertical-align: baseline; white-space: pre-wrap;"&gt;Breakdown of the types of bugs we’re finding&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;Notable results&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;OSS-Fuzz has found numerous security vulnerabilities in several critical open source projects: &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=Proj%3Dfreetype2+Type%3DBug-Security+status%3ANew%2CAccepted%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;10&lt;/a&gt; in FreeType2, &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=Proj%3Dffmpeg+Type%3DBug-Security+status%3ANew%2CAccepted%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;17&lt;/a&gt; in FFmpeg, &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=Proj%3Dlibreoffice+Type%3DBug-Security+status%3ANew%2CAccepted%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;33&lt;/a&gt; in LibreOffice, &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=Proj%3Dsqlite3+Type%3DBug-Security+status%3ANew%2CAccepted%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;8&lt;/a&gt; in SQLite 3, &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=Proj%3Dgnutls+Type%3DBug-Security+status%3ANew%2CAccepted%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;10&lt;/a&gt; in GnuTLS, &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=Proj%3Dpcre2+Type%3DBug-Security+status%3ANew%2CAccepted%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;25&lt;/a&gt; in PCRE2, &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=Proj%3Dgrpc+Type%3DBug-Security+status%3DNew%2CAccepted%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;9&lt;/a&gt; in gRPC, and &lt;a href="https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&amp;amp;q=Proj%3Dwireshark+Type%3DBug-Security+status%3DNew%2CAccepted%2CFixed%2CVerified&amp;amp;colspec=ID+Type+Component+Status+Proj+Reported+Owner+Summary&amp;amp;cells=ids"&gt;7&lt;/a&gt; in Wireshark. We’ve also had at least one bug collision with another independent security researcher (CVE-2017-2801). (Some of the bugs are still view-restricted so links may show smaller numbers.)&lt;br /&gt;&lt;br /&gt;Once a project is integrated into OSS-Fuzz, the continuous and automated nature of OSS-Fuzz means that we often catch these issues just hours after the regression is introduced into the upstream repository, so that the chances of users being affected is reduced.&lt;br /&gt;&lt;br /&gt;Fuzzing not only finds memory safety related bugs, it can also find correctness or logic bugs. One example is a carry propagating bug in OpenSSL (&lt;a href="https://www.openssl.org/news/secadv/20170126.txt"&gt;CVE-2017-3732&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;Finally, OSS-Fuzz has reported over 300 &lt;a href="https://github.com/google/oss-fuzz/blob/master/docs/faq.md#how-do-you-handle-timeouts-and-ooms"&gt;timeout and out-of-memory failures&lt;/a&gt; (~75% of which got fixed). Not every project treats these as bugs, but fixing them enables OSS-Fuzz to find more interesting bugs.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;Announcing rewards for open source projects&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;We believe that user and internet security as a whole can benefit greatly if more open source projects include fuzzing in their development process. To this end, we’d like to encourage more projects to participate and adopt the &lt;a href="https://github.com/google/oss-fuzz/blob/master/docs/ideal_integration.md"&gt;ideal integration&lt;/a&gt; guidelines that we’ve established.&lt;br /&gt;&lt;br /&gt;Combined with fixing all the issues that are found, this is often a significant amount of work for developers who may be working on an open source project in their spare time. To support these projects, we are expanding our existing &lt;a href="https://www.google.com/about/appsecurity/patch-rewards/"&gt;Patch Rewards&lt;/a&gt; program to include rewards for the integration of &lt;a href="https://github.com/google/oss-fuzz/blob/master/docs/glossary.md#fuzz-target"&gt;fuzz targets&lt;/a&gt; into OSS-Fuzz.&lt;br /&gt;&lt;br /&gt;To qualify for these rewards, a project needs to have a large user base and/or be critical to global IT infrastructure. Eligible projects will receive $1,000 for initial integration, and up to $20,000 for ideal integration (the final amount is at our discretion). You have the option of donating these rewards to charity instead, and Google will double the amount.&lt;br /&gt;&lt;br /&gt;To qualify for the ideal integration reward, projects must show that:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Fuzz targets are checked into their upstream repository and integrated in the build system with &lt;a href="https://github.com/google/sanitizers"&gt;sanitizer&lt;/a&gt; support (up to $5,000).&amp;nbsp;&lt;/li&gt;&lt;li&gt;Fuzz targets are &lt;a href="https://github.com/google/oss-fuzz/blob/master/docs/clusterfuzz.md#performance-analyzer"&gt;efficient&lt;/a&gt; and provide good code coverage (&amp;gt;80%) (up to $5,000).&amp;nbsp;&lt;/li&gt;&lt;li&gt;Fuzz targets are part of the official upstream development and regression testing process, i.e. they are maintained, run against old known crashers and the periodically updated &lt;a href="https://github.com/google/oss-fuzz/blob/master/docs/ideal_integration.md#seed-corpus"&gt;corpora&lt;/a&gt; (up to $5,000).&amp;nbsp;&lt;/li&gt;&lt;li&gt;The last $5,000 is a “&lt;a href="https://en.wikipedia.org/wiki/Leet"&gt;l33t&lt;/a&gt;” bonus that we may reward at our discretion for projects that we feel have gone the extra mile or done something really awesome.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;We’ve already started to contact the first round of projects that are eligible for the initial reward. If you are the maintainer or point of contact for one of these projects, you may also &lt;a href="https://docs.google.com/a/google.com/forms/d/e/1FAIpQLSdh4LZVbo3TuViaHqMLbHP5J0fWe0_u_RPUupgq-HHp4W9wGg/viewform"&gt;reach out&lt;/a&gt; to us in order to apply for our ideal integration rewards.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;The future&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We’d like to thank the existing contributors who integrated their projects and fixed countless bugs. We hope to see more projects integrated into OSS-Fuzz, and greater adoption of fuzzing as standard practice when developing software.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=15_kLQBsKbM:YqLdnjfvHY0:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=15_kLQBsKbM:YqLdnjfvHY0:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=15_kLQBsKbM:YqLdnjfvHY0:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/15_kLQBsKbM" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/509193856334617477/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=509193856334617477&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/509193856334617477" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/509193856334617477" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/15_kLQBsKbM/oss-fuzz-five-months-later-and.html" title="OSS-Fuzz: Five months later, and rewarding projects" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-0JD6IhtCvu8/WRCYuY1z-FI/AAAAAAAAAeo/HuZLIK1r6zYEYTQ9mTYb0y7qo5gVbHurQCLcB/s72-c/chart.jpg" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/05/oss-fuzz-five-months-later-and.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-7671315843065492633</id><published>2017-05-05T10:08:00.000-07:00</published><updated>2017-05-05T10:08:02.428-07:00</updated><title type="text">Protecting You Against Phishing</title><content type="html">&lt;span class="byline-author"&gt;Posted by Mark Risher, Director, Counter Abuse Technology&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As many email users know, phishing attacks—or emails that impersonate a trusted source to trick users into sharing information—are a pervasive problem. If you use Gmail, you can rest assured that every day, millions of phishing emails are blocked from ever reaching your inbox.&lt;br /&gt;&lt;br /&gt;This week, we defended against an email &lt;a href="https://productforums.google.com/forum/#!topic/docs/zbkCm9Ohw0s;context-place=topicsearchin/docs/phishing%7Csort:date"&gt;phishing campaign&lt;/a&gt; that tricked some of our users into inadvertently granting access to their contact information, with the intent to spread more phishing emails. We took quick action to revoke all access granted to the attacker as well as steps to reduce and prevent harm from future variants of this type of attack.&lt;br /&gt;&lt;br /&gt;Here’s some background to help you understand how the campaign worked, how we addressed it, and how you can better protect yourself against attacks.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;How the campaign worked and how we addressed it&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Victims of this attack received an email that appeared to be an invite to a Google Doc from one of their contacts. When users clicked the link in the attacker’s email, it directed them to the attacker’s application, which requested access to the user’s account under the false pretense of gaining access to the Google Doc. If the user authorized access to the application (through a mechanism called OAuth), it used the user's contact list to send the same message to more people.&lt;br /&gt;&lt;br /&gt;Upon detecting this issue, we immediately responded with a combination of automatic and manual actions that ended this campaign within an hour. We removed fake pages and applications, and pushed user-protection updates through Safe Browsing, Gmail, Google Cloud Platform, and other counter-abuse systems. Fewer than 0.1% of our users were affected by this attack, and we have taken steps to re-secure affected accounts.&lt;br /&gt;&lt;br /&gt;We protect our users from phishing attacks in a number of ways, including: &lt;br /&gt;&lt;ul&gt;&lt;li&gt;Using machine learning-based detection of spam and phishing messages, which has contributed to 99.9% accuracy in spam detection.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Providing &lt;a href="https://www.google.com/transparencyreport/safebrowsing/"&gt;Safe Browsing&lt;/a&gt; warnings about dangerous links, within Gmail and across more than 2 billion browsers.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Preventing suspicious account sign-ins through dynamic, risk-based challenges.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Scanning email attachments for malware and other dangerous payloads.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;In addition, we’re taking multiple steps to combat this type of attack in the future, including updating our policies and enforcement on OAuth applications, updating our anti-spam systems to help prevent campaigns like this one, and augmenting monitoring of suspicious third-party apps that request information from our users.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;How users can protect themselves&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;We’re committed to keeping your Google Account safe, and have layers of defense in place to guard against sophisticated attacks of all types, from anti-hijacking systems detecting unusual behavior, to machine learning models that block malicious content, to protection measures in Chrome and through Safe Browsing that guard against visiting suspicious sites. In addition, here are a few ways users can further protect themselves:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Take the &lt;a href="https://myaccount.google.com/secureaccount?pli=1"&gt;Google Security Checkup&lt;/a&gt;, paying particular attention to any applications or devices you no longer use, as well as any unrecognized devices.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Pay attention to &lt;a href="https://support.google.com/mail/answer/1074268?hl=en"&gt;warnings and alerts&lt;/a&gt; that appear in Gmail and other products.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Report &lt;a href="https://support.google.com/mail/answer/8253?hl=en"&gt;suspicious emails&lt;/a&gt; and &lt;a href="https://safebrowsing.google.com/safebrowsing/report_phish/"&gt;other content&lt;/a&gt; to Google.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;b&gt;How G Suite admins can protect their users&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;We’ve separately notified G Suite customers whose users were tricked into granting OAuth access. While no further admin or user action is required for this incident, if you are a G Suite admin, consider the following best practices to generally improve security:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Review and verify current &lt;a href="https://support.google.com/a/answer/162106?hl=en"&gt;OAuth API access by third-parties&lt;/a&gt;.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Run &lt;a href="https://support.google.com/a/answer/6124308?hl=en"&gt;OAuth Token audit log reports&lt;/a&gt; to catch future inadvertent scope grants and set up automated email alerts in the Admin console using the &lt;a href="https://support.google.com/a/answer/3230421?hl=en"&gt;custom alerts feature&lt;/a&gt;, or script it with the &lt;a href="https://developers.google.com/admin-sdk/reports/v1/reference/activity-ref-appendix-a/token-event-names"&gt;Reports API&lt;/a&gt;.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Turn on 2-step verification for your organization and use &lt;a href="https://support.google.com/accounts/answer/6103523?co=GENIE.Platform%3DAndroid&amp;amp;hl=en"&gt;security keys&lt;/a&gt;.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Follow the &lt;a href="https://support.google.com/a/answer/2984349?hl=en-uk&amp;amp;hlrm=en"&gt;security checklist&lt;/a&gt; if you feel that an account may be compromised.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Help prevent abuse of your brand in phishing attacks by publishing a &lt;a href="https://support.google.com/a/answer/2466580?hl=en"&gt;DMARC&lt;/a&gt; policy for your organization.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://support.google.com/a/answer/6374496"&gt;Use&lt;/a&gt; and enforce rules for &lt;a href="https://support.google.com/a/answer/7280976?hl=en"&gt;S/MIME encryption&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&amp;nbsp;Here is a list of more &lt;a href="https://www.google.com/safetycenter/everyone/start/"&gt;tips and tools&lt;/a&gt; to help you stay secure on the web.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=pIB4BjaWOE0:pJgaQsx_KCA:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=pIB4BjaWOE0:pJgaQsx_KCA:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=pIB4BjaWOE0:pJgaQsx_KCA:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/pIB4BjaWOE0" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/7671315843065492633/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=7671315843065492633&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/7671315843065492633" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/7671315843065492633" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/pIB4BjaWOE0/protecting-you-against-phishing.html" title="Protecting You Against Phishing" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/05/protecting-you-against-phishing.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-66657357752486350</id><published>2017-04-27T10:17:00.000-07:00</published><updated>2017-04-27T10:17:36.364-07:00</updated><title type="text">Next Steps Toward More Connection Security </title><content type="html">&lt;span class="byline-author"&gt;Posted by Emily Schechter, Chrome Security Team&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In January, we &lt;a href="https://security.googleblog.com/2016/09/moving-towards-more-secure-web.html"&gt;began our quest&lt;/a&gt; to improve how Chrome communicates the connection security of HTTP pages. Chrome now marks HTTP pages as “Not secure” if they have password or credit card fields. Beginning in October 2017, Chrome will show the “Not secure” warning in two additional situations: when users enter data on an HTTP page, and on all HTTP pages visited in &lt;a href="https://support.google.com/chromebook/answer/95464?co=GENIE.Platform%3DDesktop&amp;amp;hl=en"&gt;Incognito mode&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img height="150" src="https://lh5.googleusercontent.com/-KN9c6ug_6yZFRRnojhUvRkQ655cZkCK6C6kWUXEDiQl-7DHGCtmmROy9LGAYKkW_5KRpG0L5Dgm9mELJuunDn5ZGlA_nVTLM7MUIzgXVDvQ9mRaort2qnlZXYTzmofOS8TosCAn" style="border: none; margin-left: auto; margin-right: auto; transform: rotate(0rad);" width="400" /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span id="docs-internal-guid-0c79d3e4-b05f-1ea2-7fb2-c2042be617e2"&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"&gt;&lt;span style="background-color: white; color: #333333; font-family: Arial; font-size: 10pt; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"&gt;Treatment of HTTP pages in Chrome 62&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;a href="https://www.chromium.org/Home/chromium-security/marking-http-as-non-secure"&gt;&lt;br /&gt;Our plan&lt;/a&gt; to label HTTP sites as non-secure is taking place in gradual steps, based on increasingly broad criteria. Since the &lt;a href="https://security.googleblog.com/2016/09/moving-towards-more-secure-web.html"&gt;change in Chrome 56&lt;/a&gt;, there has been a 23% reduction in the fraction of navigations to HTTP pages with password or credit card forms on desktop, and we’re ready to take the next steps.&lt;br /&gt;&lt;br /&gt;Passwords and credit cards are not the only types of data that should be private. Any type of data that users type into websites should not be accessible to others on the network, so starting in version 62 Chrome will show the “Not secure” warning when users type data into HTTP sites.&lt;br /&gt;&lt;br /&gt;&lt;div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"&gt;&lt;span style="background-color: transparent; color: black; font-family: Arial; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"&gt;&lt;img height="271" src="https://lh6.googleusercontent.com/dmaHJpLKiq9RfhyN81jd9KQyohOAJh1UW5Fv978fiWTcl98u4rMoJy0CaOmiFi1NYE7zCoAsG-1CW6O9PL8ytpRC8Lzz_8dtd7NC4IOM5eG6AfLEorCpV13CrNnMVdwzSLTKZOn1" style="border: none; transform: rotate(0rad);" width="370" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span id="docs-internal-guid-0c79d3e4-b065-836d-d144-cc77fb901095"&gt;&lt;span style="background-color: white; color: #333333; font-family: Arial; font-size: 10pt; font-style: italic; vertical-align: baseline; white-space: pre-wrap;"&gt;Treatment of HTTP pages with user-entered data in Chrome 62&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;When users browse Chrome with Incognito mode, they likely have increased expectations of privacy. However, HTTP browsing is not private to others on the network, so in version 62 Chrome will also warn users when visiting an HTTP page in Incognito mode.&lt;br /&gt;&lt;br /&gt;Eventually, we plan to show the “Not secure” warning for all HTTP pages, even outside Incognito mode. We will publish updates as we approach future releases, but don’t wait to get started moving to HTTPS! HTTPS is &lt;a href="https://www.youtube.com/watch?v=e6DUrH56g14"&gt;easier and cheaper than ever before&lt;/a&gt;, and it enables both the best performance the web offers and powerful new features that are too sensitive for HTTP. Check out our &lt;a href="https://developers.google.com/web/fundamentals/security/encrypt-in-transit/enable-https?hl=en"&gt;set-up guides&lt;/a&gt; to get started.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=V4YeZXUbkGI:UgdmFQpXvbY:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=V4YeZXUbkGI:UgdmFQpXvbY:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=V4YeZXUbkGI:UgdmFQpXvbY:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/V4YeZXUbkGI" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/66657357752486350/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=66657357752486350&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/66657357752486350" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/66657357752486350" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/V4YeZXUbkGI/next-steps-toward-more-connection.html" title="Next Steps Toward More Connection Security " /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/04/next-steps-toward-more-connection.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-401213957887926513</id><published>2017-04-06T09:28:00.000-07:00</published><updated>2017-04-06T09:29:28.502-07:00</updated><title type="text">New Research: Keeping fake listings off Google Maps</title><content type="html">&lt;span class="byline-author"&gt;Posted by Doug Grundman, Maps Anti-Abuse, and Kurt Thomas, Security &amp;amp; Anti-Abuse Research&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.google.com/business/"&gt;Google My Business&lt;/a&gt; enables millions of business owners to create listings and share information about their business on Google Maps and Search, making sure everything is up-to-date and accurate for their customers. Unfortunately, some actors attempt to abuse this service to register fake listings in order to defraud legitimate business owners, or to &lt;a href="https://www.nytimes.com/2016/01/31/business/fake-online-locksmiths-may-be-out-to-pick-your-pocket-too.html?_r=1"&gt;charge exorbitant service fees for services&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Over a year ago, we teamed up with the University of California, San Diego to research the actors behind fake listings, in order to improve our products and keep our users safe. The full report, &lt;a href="https://research.google.com/pubs/pub45976.html"&gt;“Pinning Down Abuse on Google Maps”&lt;/a&gt;, will be presented tomorrow at the 2017&lt;a href="http://www2017.com.au/"&gt; International World Wide Web Conference&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Our study shows that fewer than 0.5% of local searches lead to fake listings. We’ve also improved how we verify new businesses, which has reduced the number of fake listings by 70% from its all-time peak back in June 2015.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What is a fake listing?&lt;/b&gt;&lt;br /&gt;For over a year, we tracked the bad actors behind fake listings. &amp;nbsp;Unlike email-based scams &lt;a href="https://security.googleblog.com/2015/09/new-research-underground-market-fueling.html"&gt;selling knock-off products online&lt;/a&gt;, local listing scams require physical proximity to potential victims. This fundamentally changes both the scale and types of abuse possible.&lt;br /&gt;&lt;br /&gt;Bad actors posing as locksmiths, plumbers, electricians, and other contractors were the most common source of abuse—roughly 2 out of 5 fake listings. The actors operating these fake listings would cycle through non-existent postal addresses and disposable VoIP phone numbers even as their listings were discovered and disabled. The purported addresses for these businesses were irrelevant as the contractors would travel directly to potential victims.&lt;br /&gt;&lt;br /&gt;Another 1 in 10 fake listings belonged to real businesses that bad actors had improperly claimed ownership over, such as hotels and restaurants. While making a reservation or ordering a meal was indistinguishable from the real thing, behind the scenes, the bad actors would deceive the actual business into paying referral fees for organic interest.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;How does Google My Business verify information?&lt;/b&gt;&lt;br /&gt;Google My Business currently verifies the information provided by business owners before making it available to users. For freshly created listings, we physically mail a postcard to the new listings’ address to ensure the location really exists. For businesses changing owners, we make an automated call to the listing’s phone number to verify the change.&lt;br /&gt;&lt;br /&gt;&lt;img alt="fake_location.png" height="181" src="https://lh6.googleusercontent.com/euzzpR-cB8bs8X1YHDZVw_rE9AB89f1byvhUCr4t6OMm7Dcori1xm9FM7iKT49nue5N1_cPFn1LrmWQZV6vBDN9d-GNxhvPfGo5_xo2bRNkIcjs1bYdyxG0IArMtbUvPHiGUbFmn" style="border: none; font-family: Arial; font-size: 10pt; transform: rotate(0rad); white-space: pre-wrap;" width="492" /&gt;&lt;br /&gt;&lt;br /&gt;Unfortunately, our research showed that these processes can be abused to get fake listings on Google Maps. Fake contractors would request hundreds of postcard verifications to non-existent suites at a single address, such as 123 Main St #456 and 123 Main St #789, or to stores that provided PO boxes. Alternatively, a phishing attack could maliciously repurpose freshly verified business listings by tricking &amp;nbsp;the legitimate owner into sharing verification information sent either by phone or postcard.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Keeping deceptive businesses out — by the numbers&lt;/b&gt;&lt;br /&gt;Leveraging our study’s findings, we’ve made significant changes to how we verify addresses and are even &lt;a href="https://news.fastcompany.com/google-is-testing-out-a-merchant-verification-program-to-weed-out-fake-businesses-4020905"&gt;piloting an advanced verification process&lt;/a&gt; for locksmiths and plumbers. Improvements we’ve made include prohibiting bulk registrations at most addresses, preventing businesses from relocating impossibly far from their original address without additional verification, and detecting and ignoring intentionally mangled text in address fields designed to confuse our algorithms. We have also adapted our anti-spam machine learning systems to detect data discrepancies common to fake or deceptive listings.&lt;br /&gt;&lt;br /&gt;Combined, here’s how these defenses stack up:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;We detect and disable 85% of fake listings before they even appear on Google Maps.&lt;/li&gt;&lt;li&gt;We’ve reduced the number of abusive listings by 70% from its peak back in June 2015.&lt;/li&gt;&lt;li&gt;We’ve also reduced the number of impressions to abusive listings by 70%.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;As we’ve shown, verifying local information comes with a number of unique anti-abuse challenges. While fake listings may slip through our defenses from time to time, we are constantly improving our systems to better serve both users and business owners.&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=CGFCV57r0qs:P39zySBkC0g:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=CGFCV57r0qs:P39zySBkC0g:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=CGFCV57r0qs:P39zySBkC0g:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/CGFCV57r0qs" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/401213957887926513/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=401213957887926513&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/401213957887926513" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/401213957887926513" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/CGFCV57r0qs/new-research-keeping-fake-listings-off.html" title="New Research: Keeping fake listings off Google Maps" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/04/new-research-keeping-fake-listings-off.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-4924812557514316892</id><published>2017-04-03T13:26:00.000-07:00</published><updated>2017-04-03T13:27:33.697-07:00</updated><title type="text">An Investigation of Chrysaor Malware on Android</title><content type="html">&lt;span class="byline-author"&gt;Posted by Rich Cannings, Jason Woloz, Neel Mehta, Ken Bodzak, Wentao Chang, Megan Ruthven&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Google is constantly working to improve our systems that protect users from &lt;a href="http://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_PHA_classifications.pdf"&gt;Potentially Harmful Applications &lt;/a&gt;(PHAs). Usually, PHA authors attempt to install their harmful apps on as many devices as possible. However, a few PHA authors spend substantial effort, time, and money to create and install their harmful app on one or a very small number of devices. This is known as a &lt;a href="https://en.wikipedia.org/wiki/Targeted_threat"&gt;targeted attack&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;In this blog post, we describe Chrysaor, a newly discovered family of spyware that was used in a targeted attack on a small number of Android devices, and how investigations like this help Google protect Android users from a variety of threats.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What is Chrysaor?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Chrysaor is spyware believed to be created by &lt;a href="https://en.wikipedia.org/wiki/NSO_Group"&gt;NSO Group Technologies&lt;/a&gt;, specializing in the creation and sale of software and infrastructure for targeted attacks. Chrysaor is believed to be related to the Pegasus spyware that was &lt;a href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"&gt;first identified on iOS&lt;/a&gt; and analyzed by &lt;a href="https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"&gt;Citizen Lab&lt;/a&gt; and &lt;a href="https://blog.lookout.com/"&gt;Lookout&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Late last year, after receiving a list of suspicious package names from Lookout, we discovered that a few dozen Android devices may have installed an application related to Pegasus, which we named Chrysaor. Although the applications were never available in Google Play, we immediately identified the scope of the problem by using &lt;a href="https://support.google.com/accounts/answer/2812853?hl=en"&gt;Verify Apps&lt;/a&gt;.  We gathered information from affected devices, and concurrently, attempted to acquire Chrysaor apps to better understand its impact on users. We’ve contacted the potentially affected users, disabled the applications on affected devices, and implemented changes in Verify Apps to protect all users.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What is the scope of Chrysaor?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Chrysaor was never available in Google Play and had a very low volume of installs outside of Google Play. Among the over 1.4 billion devices protected by Verify Apps, we observed fewer than 3 dozen installs of Chrysaor on victim devices. These devices were located in the following countries:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-ki370uu-yhw/WOKroVmtVoI/AAAAAAAAAdM/AlbRsgphUmMpTNZoucwdn4eTExrKXQuGQCLcB/s1600/Screen%2BShot%2B2017-04-03%2Bat%2B4.04.44%2BPM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="374" src="https://4.bp.blogspot.com/-ki370uu-yhw/WOKroVmtVoI/AAAAAAAAAdM/AlbRsgphUmMpTNZoucwdn4eTExrKXQuGQCLcB/s640/Screen%2BShot%2B2017-04-03%2Bat%2B4.04.44%2BPM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;How we protect you&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;To protect Android devices and users, Google Play provides a complete set of security services that update outside of platform releases. Users don’t have to install any additional security services to keep their devices safe. In 2016, these services protected over 1.4 billion devices, making Google one of the largest providers of on-device security services in the world:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://googlemobile.blogspot.com/2012/02/android-and-security.html"&gt;Identify PHAs&lt;/a&gt; using people, systems in the cloud, and data sent to us from devices&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://support.google.com/accounts/answer/2812853"&gt;Warn users about or blocking users from installing PHAs&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://android.googleblog.com/2014/04/expanding-googles-security-services-for.html"&gt;Continually scan devices for PHAs and other harmful threats&amp;nbsp;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;Additionally, we are providing detailed technical information to help the security industry in our collective work against PHAs.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What do I need to do?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;It is extremely unlikely you or someone you know was affected by Chrysaor malware. Through our investigation, we identified less than 3 dozen devices affected by Chrysaor, we have disabled Chrysaor on those devices, and we have notified users of all known affected devices.  Additionally, the improvements we made to our protections have been enabled for all users of our security services.&lt;br /&gt;&lt;br /&gt;To ensure you are fully protected against PHAs and other threats, we recommend these 5 basic steps:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Install apps only from reputable sources:&lt;/b&gt; Install apps from a reputable source, such as &lt;a href="https://play.google.com/store"&gt;Google Play&lt;/a&gt;. No Chrysaor apps were on Google Play.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href="https://support.google.com/nexus/answer/2819522"&gt;Enable a secure lock screen&lt;/a&gt;:&lt;/b&gt; Pick a PIN, pattern, or password that is easy for you to remember and hard for others to guess.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href="https://support.google.com/nexus/answer/4457705"&gt;Update your device&lt;/a&gt;:&lt;/b&gt; Keep your device up-to-date with the latest security patches.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;a href="https://support.google.com/accounts/answer/2812853"&gt;Verify Apps:&lt;/a&gt;&lt;/b&gt; Ensure&amp;nbsp;Verify Apps is enabled.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Locate your device:&lt;/b&gt; Practice finding your device with &lt;a href="https://accounts.google.com/signin/v2/sl/pwd?service=androidconsole&amp;amp;passive=3600&amp;amp;continue=https%3A%2F%2Fwww.google.com%2Fandroid%2Fdevicemanager&amp;amp;followup=https%3A%2F%2Fwww.google.com%2Fandroid%2Fdevicemanager&amp;amp;authuser=0&amp;amp;flowName=GlifWebSignIn"&gt;Android Device Manager&lt;/a&gt; because you are far more likely to lose your device than install a PHA.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;How does Chrysaor work?&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;To install Chrysaor, we believe an attacker coaxed specifically targeted individuals to download the malicious software onto their device. Once Chrysaor is installed, a remote operator is able to surveil the victim’s activities on the device and within the vicinity, leveraging microphone, camera, data collection, and logging and tracking application activities on communication apps such as phone and SMS.&lt;br /&gt;&lt;br /&gt;One representative sample Chrysaor app that we analyzed was tailored to devices running Jellybean (4.3) or earlier. The following is a review of scope and impact of the Chrysaor app named com.network.android tailored for a Samsung device target, with SHA256 digest:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;ade8bef0ac29fa363fc9afd958af0074478aef650adeb0318517b48bd996d5d5&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Upon installation, the app uses known framaroot exploits to escalate privileges and break Android’s application sandbox. If the targeted device is not vulnerable to these exploits, then the app attempts to use  a superuser binary pre-positioned at /system/csk to elevate privileges.&lt;br /&gt;&lt;br /&gt;After escalating privileges, the app immediately protects itself and starts to collect data, by:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Installing itself on the /system partition to persist across factory resets&amp;nbsp;&lt;/li&gt;&lt;li&gt;Removing Samsung’s system update app (com.sec.android.fotaclient) and disabling auto-updates to maintain persistence (sets Settings.System.SOFTWARE_UPDATE_AUTO_UPDATE to 0)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deleting WAP push messages and changing WAP message settings, possibly for anti-forensic purpose.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Starting content observers and the main task loop to receive remote commands and exfiltrate data.&lt;/li&gt;&lt;/ul&gt;The app uses six techniques to collect user data:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Repeated commands:&lt;/b&gt; use alarms to periodically repeat actions on the device to expose data, including gathering location data.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Data collectors: &lt;/b&gt;dump all existing content on the device into a queue. Data collectors are used in conjunction with repeated commands to collect user data including, SMS settings, SMS messages, Call logs, Browser History, Calendar, Contacts, Emails, and messages from selected messaging apps, including WhatsApp, Twitter, Facebook, Kakoa, Viber, and Skype by making /data/data directories of the apps world readable.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Content observers: &lt;/b&gt;use Android’s &lt;a href="https://developer.android.com/reference/android/database/ContentObserver.html"&gt;ContentObserver&lt;/a&gt; framework to gather changes in SMS, Calendar, Contacts, Cell info, Email, WhatsApp, Facebook, Twitter, Kakao, Viber, and Skype.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Screenshots:&lt;/b&gt; captures an image of the current screen via the raw frame buffer.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Keylogging:&lt;/b&gt; record input events by hooking &lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;IPCThreadState::Transact from /system/lib/libbinder.so, and intercepting android::parcel with the interface com.android.internal.view.IInputContext.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;RoomTap: &lt;/b&gt;silently answers a telephone call and stays connected in the background, allowing the caller to hear conversations within the range of the phone's microphone. If the user unlocks their device, they will see a black screen while the app drops the call, resets call settings and prepares for the user to interact with the device normally.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;Finally, the app can remove itself through three ways:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Via a command from the server&amp;nbsp;&lt;/li&gt;&lt;li&gt;Autoremove if the device has not been able to check in to the server after 60 days&amp;nbsp;&lt;/li&gt;&lt;li&gt;Via an antidote file. If /sdcard/MemosForNotes was present on the device, the Chrysaor app removes itself from the device.&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Samples uploaded to VirusTotal&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;To encourage further research in the security community, we’ve uploaded these sample Chrysaor apps to Virus Total.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-4uoNVH_4-os/WOKrdoYbfKI/AAAAAAAAAdE/mqZLmGFip9YD_AjKVX7SEfaVqc-2Bi-qQCLcB/s1600/Screen%2BShot%2B2017-04-03%2Bat%2B4.04.53%2BPM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="155" src="https://3.bp.blogspot.com/-4uoNVH_4-os/WOKrdoYbfKI/AAAAAAAAAdE/mqZLmGFip9YD_AjKVX7SEfaVqc-2Bi-qQCLcB/s640/Screen%2BShot%2B2017-04-03%2Bat%2B4.04.53%2BPM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Additional digests with links to Chrysaor&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;As a result of our investigation we have identified these additional Chrysaor-related apps.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-tK0tX4I8wSU/WOKrhsjQ6wI/AAAAAAAAAdI/ScnjsGPMLR0U9m7ynqmqxS_u-lIqDEvlQCLcB/s1600/Screen%2BShot%2B2017-04-03%2Bat%2B4.04.59%2BPM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="324" src="https://2.bp.blogspot.com/-tK0tX4I8wSU/WOKrhsjQ6wI/AAAAAAAAAdI/ScnjsGPMLR0U9m7ynqmqxS_u-lIqDEvlQCLcB/s640/Screen%2BShot%2B2017-04-03%2Bat%2B4.04.59%2BPM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Lookout has completed their own independent analysis of the samples we acquired, their report can be viewed &lt;a href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-android-technical-analysis.pdf"&gt;here&lt;/a&gt;.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=ONGYCe-yODM:Opp8AZoV_5k:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=ONGYCe-yODM:Opp8AZoV_5k:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=ONGYCe-yODM:Opp8AZoV_5k:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/ONGYCe-yODM" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/4924812557514316892/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=4924812557514316892&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4924812557514316892" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4924812557514316892" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/ONGYCe-yODM/an-investigation-of-chrysaor-malware-on.html" title="An Investigation of Chrysaor Malware on Android" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-ki370uu-yhw/WOKroVmtVoI/AAAAAAAAAdM/AlbRsgphUmMpTNZoucwdn4eTExrKXQuGQCLcB/s72-c/Screen%2BShot%2B2017-04-03%2Bat%2B4.04.44%2BPM.png" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-2611785376681470870</id><published>2017-03-29T11:22:00.000-07:00</published><updated>2017-03-29T11:22:15.563-07:00</updated><title type="text">Updates to the Google Safe Browsing’s Site Status Tool</title><content type="html">&lt;span class="byline-author"&gt;Posted Deeksha Padma Prasad and Allison Miller, Safe Browsing&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="https://safebrowsing.google.com/"&gt;Google Safe Browsing&lt;/a&gt; gives users tools to help protect themselves from web-based threats like malware, unwanted software, and social engineering. We are best known for our warnings, which users see when they attempt to navigate to dangerous sites or download dangerous files. We also provide other tools, like the &lt;a href="https://www.google.com/transparencyreport/safebrowsing/diagnostic/"&gt;Site Status Tool&lt;/a&gt;, where people can check the current safety status of a web page (without having to visit it).&lt;br /&gt;&lt;br /&gt;We host this tool within Google’s  &lt;a href="https://www.google.com/transparencyreport/safebrowsing/"&gt;Safe Browsing Transparency Report&lt;/a&gt;. As with other sections in Google’s &lt;a href="https://www.google.com/transparencyreport/?hl=en"&gt;Transparency Report,&lt;/a&gt; we make this data available to give the public more visibility into the security and health of the online ecosystem. Users of the &lt;a href="https://www.google.com/transparencyreport/safebrowsing/diagnostic/"&gt;Site Status Tool&lt;/a&gt; input a webpage (as a URL, website, or domain) into the tool, and the most recent results of the Safe Browsing analysis for that webpage are returned...plus references to troubleshooting help and educational materials.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-30tkAzAhi98/WNv6il9c1DI/AAAAAAAAAcs/131UeaBCbiwZi6zySwP1E3sKwljB61iNwCLcB/s1600/Safe%2BBrowsing.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="448" src="https://1.bp.blogspot.com/-30tkAzAhi98/WNv6il9c1DI/AAAAAAAAAcs/131UeaBCbiwZi6zySwP1E3sKwljB61iNwCLcB/s640/Safe%2BBrowsing.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;We’ve just launched a new version of the &lt;a href="https://www.google.com/transparencyreport/safebrowsing/diagnostic/"&gt;Site Status Tool&lt;/a&gt; that provides simpler, clearer results and is better designed for the primary users of the page: people who are visiting the tool from a Safe Browsing warning they’ve received, or doing casual research on Google’s malware and phishing detection. The tool now features a cleaner UI, easier-to-interpret language, and more precise results. We’ve also moved some of the more technical data on associated ASes (autonomous systems) over to the &lt;a href="https://www.google.com/transparencyreport/safebrowsing/malware/#region=ALL&amp;amp;period=90&amp;amp;size=LARGEST&amp;amp;compromised&amp;amp;attack&amp;amp;asn=32097&amp;amp;page=1"&gt;malware dashboard section of the report&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;While the interface has been streamlined, additional diagnostic information is not gone: researchers who wish to find more details can drill-down elsewhere in &lt;a href="https://www.google.com/transparencyreport/safebrowsing/"&gt;Safe Browsing’s Transparency Report&lt;/a&gt;, while site-owners can find additional diagnostic information in &lt;a href="https://www.google.com/webmasters/tools/home?hl=en&amp;amp;pli=1"&gt;Search Console&lt;/a&gt;. One of the goals of the Transparency Report is to shed light on complex policy and security issues, so, we hope the design adjustments will indeed provide our users with additional clarity.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=3pHRVmM6z8Y:9hS28c3QEUQ:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=3pHRVmM6z8Y:9hS28c3QEUQ:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=3pHRVmM6z8Y:9hS28c3QEUQ:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/3pHRVmM6z8Y" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/2611785376681470870/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=2611785376681470870&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/2611785376681470870" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/2611785376681470870" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/3pHRVmM6z8Y/updates-to-google-safe-browsings-site.html" title="Updates to the Google Safe Browsing’s Site Status Tool" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-30tkAzAhi98/WNv6il9c1DI/AAAAAAAAAcs/131UeaBCbiwZi6zySwP1E3sKwljB61iNwCLcB/s72-c/Safe%2BBrowsing.png" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/03/updates-to-google-safe-browsings-site.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-8725176797172394330</id><published>2017-03-24T13:06:00.000-07:00</published><updated>2017-03-27T10:57:40.043-07:00</updated><title type="text">Reassuring our users about government-backed attack warnings</title><content type="html">&lt;span class="byline-author"&gt;Posted by Shane Huntley, Google Threat Analysis Group&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="https://security.googleblog.com/2012/06/security-warnings-for-suspected-state.html"&gt;Since 2012&lt;/a&gt;, we’ve warned our users if we believe their Google accounts are being targeted by government-backed attackers.&lt;br /&gt;&lt;br /&gt;We send these out of an abundance of caution — the notice does not necessarily mean that the account has been compromised or that there is a widespread attack. Rather, the notice reflects our assessment that a government-backed attacker has likely attempted to access the user’s account or computer through phishing or malware, for example. You can read more about these warnings &lt;a href="https://support.google.com/mail/answer/2591015?hl=en"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-M3G5VB9T4cI/WNWkXutcHiI/AAAAAAAAAcU/ww1-lxJdUnAIq3-Vrj8Pp2thY4m5rwiOgCLcB/s1600/Screen%2BShot%2B2017-03-24%2Bat%2B1.39.35%2BPM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="305" src="https://2.bp.blogspot.com/-M3G5VB9T4cI/WNWkXutcHiI/AAAAAAAAAcU/ww1-lxJdUnAIq3-Vrj8Pp2thY4m5rwiOgCLcB/s400/Screen%2BShot%2B2017-03-24%2Bat%2B1.39.35%2BPM.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;In order to secure some of the details of our detection, we often send a batch of warnings to groups of at-risk users at the same time, and not necessarily in real-time. Additionally, we never indicate which government-backed attackers we think are responsible for the attempts; different users may be targeted by different attackers.&lt;br /&gt;&lt;br /&gt;Security has always been a top priority for us. Robust, automated protections help prevent scammers from signing into your Google account, &lt;a href="https://security.googleblog.com/2014/03/staying-at-forefront-of-email-security.html"&gt;Gmail always uses an encrypted connection&lt;/a&gt; when you receive or send email, we filter more than &lt;a href="https://gmail.googleblog.com/2015/07/the-mail-you-want-not-spam-you-dont.html"&gt;99.9% of spam&lt;/a&gt;&amp;nbsp;— a common source of phishing messages — from Gmail, and we show users when messages are from an &lt;a href="https://security.googleblog.com/2016/03/more-encryption-more-notifications-more.html"&gt;unverified or unencrypted source&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;An extremely small fraction of users will ever see one of these warnings, but if you receive this warning from us, it's important to &lt;a href="https://support.google.com/mail/answer/2591015?hl=en"&gt;take action on it&lt;/a&gt;. You can always take a two-minute &lt;a href="https://security.google.com/settings/security/secureaccount/welcome?utm_source=&amp;amp;utm_medium=blog-pr&amp;amp;utm_campaign=b4"&gt;Security Checkup&lt;/a&gt;, and for &lt;a href="https://security.googleblog.com/2017/02/better-and-more-usable-protection-from.html"&gt;maximum protection from phishing&lt;/a&gt;, enable two-step verification with a Security Key.&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=C6r7HvpHOqI:pkZuRl4zaoo:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=C6r7HvpHOqI:pkZuRl4zaoo:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=C6r7HvpHOqI:pkZuRl4zaoo:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/C6r7HvpHOqI" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/8725176797172394330/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=8725176797172394330&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8725176797172394330" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8725176797172394330" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/C6r7HvpHOqI/reassuring-our-users-about-government.html" title="Reassuring our users about government-backed attack warnings" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-M3G5VB9T4cI/WNWkXutcHiI/AAAAAAAAAcU/ww1-lxJdUnAIq3-Vrj8Pp2thY4m5rwiOgCLcB/s72-c/Screen%2BShot%2B2017-03-24%2Bat%2B1.39.35%2BPM.png" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/03/reassuring-our-users-about-government.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-8186763490511032151</id><published>2017-03-22T07:00:00.000-07:00</published><updated>2017-03-22T07:00:13.489-07:00</updated><title type="text">Diverse protections for a diverse ecosystem: Android Security 2016 Year in Review</title><content type="html">&lt;span class="byline-author"&gt;Posted by Adrian Ludwig &amp;amp; Mel Miller, Android Security Team&lt;/span&gt;&lt;br /&gt;Today, we’re sharing the third annual Android Security Year In Review, a comprehensive look at our work to protect more than 1.4 billion Android users and their data.&lt;br /&gt;&lt;br /&gt;Our goal is simple: keep users safe. In 2016, we improved our abilities to stop dangerous apps, built new security features into Android 7.0 Nougat, and collaborated with device manufacturers, researchers, and other members of the Android ecosystem. For more details, you can read the &lt;a href="https://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_2016_Report_Final.pdf"&gt;full Year in Review report&lt;/a&gt; or watch our &lt;a href="https://youtu.be/kNRS6FAsagg"&gt;webinar&lt;/a&gt;.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Protecting users from PHAs&lt;/b&gt;&lt;br /&gt;It’s critical to keep people safe from &lt;a href="https://blog.google/topics/safety-security/shielding-you-potentially-harmful-applications/"&gt;Potentially Harmful Apps (PHAs)&lt;/a&gt; that may put their data or devices at risk. Our ongoing work in this area requires us to find ways to track and stop existing PHAs, and anticipate new ones that haven’t even emerged yet.&lt;br /&gt;&lt;br /&gt;Over the years, we’ve built a variety of systems to address these threats, such as application analyzers that constantly review apps for unsafe behavior, and Verify Apps which regularly checks users’ devices for PHAs. When these systems detect PHAs, we warn users, suggest they think twice about downloading a particular app, or even remove the app from their devices entirely.&lt;br /&gt;&lt;br /&gt;We constantly monitor threats and improve our systems over time. Last year’s data reflected those improvements: Verify Apps conducted 750 million daily checks in 2016, up from 450 million the previous year, enabling us to reduce the PHA installation rate in the top 50 countries for Android usage.&lt;br /&gt;&lt;br /&gt;Google Play continues to be the safest place for Android users to download their apps. Installs of PHAs from Google Play decreased in nearly every category:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Now 0.016 percent of installs, trojans dropped by 51.5 percent compared to 2015&lt;/li&gt;&lt;li&gt;Now 0.003 percent of installs, hostile downloaders dropped by 54.6 percent compared to 2015&lt;/li&gt;&lt;li&gt;Now 0.003 percent of installs, backdoors dropped by 30.5 percent compared to 2015&lt;/li&gt;&lt;li&gt;Now 0.0018 percent of installs, phishing apps dropped by 73.4 percent compared to 2015&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;By the end of 2016, only 0.05 percent of devices that downloaded apps exclusively from Play contained a PHA; down from 0.15 percent in 2015.&lt;br /&gt;&lt;br /&gt;Still, there’s more work to do for devices overall, especially those that install apps from multiple sources. While only 0.71 percent of all Android devices had PHAs installed at the end of 2016, that was a slight increase from about 0.5 percent in the beginning of 2015. Using improved tools and the knowledge we gained in 2016, we think we can reduce the number of devices affected by PHAs in 2017, no matter where people get their apps.&lt;br /&gt;&lt;b&gt;New security protections in Nougat&lt;/b&gt;&lt;br /&gt;Last year, we introduced a &lt;a href="https://security.googleblog.com/2016/09/keeping-android-safe-security.html"&gt;variety of new protections in Nougat&lt;/a&gt;, and continued our ongoing work to &lt;a href="https://android-developers.googleblog.com/2016/07/protecting-android-with-more-linux.html"&gt;strengthen the security of the Linux Kernel&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Encryption improvements&lt;/b&gt;: In Nougat, we introduced file-based encryption which enables each user profile on a single device to be encrypted with a unique key. If you have personal and work accounts on the same device, for example, the key from one account can’t unlock data from the other. More broadly, encryption of user data has been required for capable Android devices since in late 2014, and we now see that feature enabled on over 80 percent of Android Nougat devices.&lt;/li&gt;&lt;li&gt;&lt;b&gt;New audio and video protections&lt;/b&gt;: We did significant work to &lt;a href="https://android-developers.googleblog.com/2016/05/hardening-media-stack.html"&gt;improve security and re-architect&lt;/a&gt; how Android handles video and audio media. One example: we now store different media components into individual sandboxes, where previously they lived together. Now, if one component is compromised, it doesn’t automatically have permissions to other components, which helps contain any additional issues.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Even more security for enterprise users&lt;/b&gt;: We introduced a &lt;a href="https://blog.google/topics/connected-workspaces/android-70-nougat-brings-more-sweetness-and-security-work/"&gt;variety of new enterprise security features&lt;/a&gt; including “Always On” VPN, which protects your data from the moment your device boots up and ensures it isn't traveling from a work phone to your personal device via an insecure connection. We also added security policy transparency, process logging, improved wifi certification handling, and client certification improvements to our &lt;a href="https://enterprise.google.com/android/"&gt;growing set of enterprise tools&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;Working together to secure the Android ecosystem.&lt;/b&gt;&lt;br /&gt;Sharing information about security threats between Google, device manufacturers, the research community, and others helps keep all Android users safer. In 2016, our biggest collaborations were via our monthly security updates program and ongoing partnership with the security research community.&lt;br /&gt;&lt;br /&gt;Security updates are regularly highlighted as a pillar of mobile security—and rightly so. We &lt;a href="https://android.googleblog.com/2015/08/an-update-to-nexus-devices.html"&gt;launched our monthly security updates program&lt;/a&gt; in 2015, following the public disclosure of a bug in Stagefright, to help accelerate patching security vulnerabilities across devices from many different device makers. This program expanded significantly in 2016:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;More than 735 million devices from 200+ manufacturers received a platform security update in 2016.&lt;/li&gt;&lt;li&gt;We released monthly Android security updates throughout the year for devices running Android 4.4.4 and up—that accounts for 86.3 percent of all active Android devices worldwide.&lt;/li&gt;&lt;li&gt;Our carrier and hardware partners helped expand deployment of these updates, releasing updates for over half of the top 50 devices worldwide in the last quarter of 2016.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;We provided monthly security updates for all supported Pixel and Nexus devices throughout 2016, and we’re thrilled to see our partners invest significantly in regular updates as well. There’s still a lot of room for improvement, however. About half of devices in use at the end of 2016 had not received a platform security update in the previous year. We’re working to increase device security updates by streamlining our security update program to make it easier for manufacturers to deploy security patches and releasing &lt;a href="https://source.android.com/devices/tech/ota/ab_updates.html"&gt;A/B updates&lt;/a&gt; to make it easier for users to apply those patches.&lt;br /&gt;&lt;br /&gt;On the research side, our Android Security Rewards program grew rapidly: we &lt;a href="https://security.googleblog.com/2017/01/vulnerability-rewards-program-2016-year.html"&gt;paid researchers nearly $1 million dollars&lt;/a&gt; for their reports in 2016. In parallel, we worked closely with various security firms to identify and quickly fix issues that may have posed risks to our users.&lt;br /&gt;&lt;br /&gt;We appreciate all of the hard work by Android partners, external researchers, and teams at Google that led to the progress the ecosystem has made with security in 2016. But it doesn’t stop there. Keeping users safe requires constant vigilance and effort. We’re looking forward to new insights and progress in 2017 and beyond.&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=9p4b5pgHnVI:5XgHJl2blNU:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=9p4b5pgHnVI:5XgHJl2blNU:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=9p4b5pgHnVI:5XgHJl2blNU:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/9p4b5pgHnVI" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/8186763490511032151/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=8186763490511032151&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8186763490511032151" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8186763490511032151" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/9p4b5pgHnVI/diverse-protections-for-diverse.html" title="Diverse protections for a diverse ecosystem: Android Security 2016 Year in Review" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/03/diverse-protections-for-diverse.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-7719000477691765789</id><published>2017-03-13T13:03:00.000-07:00</published><updated>2017-03-15T11:39:55.367-07:00</updated><title type="text">Detecting and eliminating Chamois, a fraud botnet on Android</title><content type="html">&lt;span class="byline-author"&gt;Posted by Security Software Engineers—Bernhard Grill, Megan Ruthven, and Xin Zhao&lt;/span&gt; &lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-uS190h3KH1k/WL29pCJd5fI/AAAAAAAACdM/7GUOagEOawQ8R3qXMGIbJ7__rxCdKM6ZQCLcB/s1600/Screen%2BShot%2B2017-03-06%2Bat%2B11.50.30%2BAM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="448" src="https://2.bp.blogspot.com/-uS190h3KH1k/WL29pCJd5fI/AAAAAAAACdM/7GUOagEOawQ8R3qXMGIbJ7__rxCdKM6ZQCLcB/s640/Screen%2BShot%2B2017-03-06%2Bat%2B11.50.30%2BAM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;Google works hard to protect users across a variety of devices and environments. Part of this work involves defending users against&amp;nbsp;&lt;a href="https://blog.google/topics/safety-security/shielding-you-potentially-harmful-applications/"&gt;Potentially Harmful Applications&lt;/a&gt;&amp;nbsp;(PHAs), an effort that gives us the opportunity to observe various types of threats targeting our ecosystem. For example, our security teams recently discovered and defended users of our ads and Android systems against a new PHA family we've named Chamois.&lt;br /&gt;&lt;br /&gt;Chamois is an Android PHA family capable of:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Generating invalid traffic&lt;/b&gt;&amp;nbsp;through ad pop ups having deceptive graphics inside the ad&lt;/li&gt;&lt;li&gt;Performing&amp;nbsp;&lt;b&gt;artificial app promotion&lt;/b&gt;&amp;nbsp;by automatically installing apps in the background&lt;/li&gt;&lt;li&gt;Performing&amp;nbsp;&lt;b&gt;telephony fraud&lt;/b&gt;&amp;nbsp;by sending&amp;nbsp;&lt;a href="https://en.wikipedia.org/wiki/Short_Message_Service#Premium-rated_short_messages"&gt;premium text messages&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Downloading and executing additional plugins&lt;/li&gt;&lt;/ul&gt;&lt;dl&gt;&lt;h3&gt; Interference with the ads ecosystem&lt;/h3&gt;&lt;div style="color: black; font-weight: normal;"&gt;We detected Chamois during a routine ad traffic quality evaluation. We analyzed malicious apps based on Chamois, and found that they employed several methods to avoid detection and tried to trick users into clicking ads by displaying deceptive graphics. This sometimes resulted in downloading of other apps that commit SMS fraud. So we blocked the Chamois app family using&amp;nbsp;&lt;a href="https://support.google.com/accounts/answer/2812853?hl=en"&gt;Verify Apps&lt;/a&gt;&amp;nbsp;and also kicked out bad actors who were trying to game our ad systems.&lt;/div&gt;&lt;/dl&gt;Our previous experience with ad fraud apps like this one enabled our teams to swiftly take action to protect both our advertisers and Android users. Because the malicious app didn't appear in the device's app list, most users wouldn't have seen or known to uninstall the unwanted app. This is why Google's&amp;nbsp;&lt;a href="https://support.google.com/accounts/answer/2812853?hl=en"&gt;Verify Apps&lt;/a&gt;&amp;nbsp;is so valuable, as it helps users discover PHAs and delete them.&lt;br /&gt;&lt;dl&gt;&lt;h3&gt; Under Chamois's hood&lt;/h3&gt;&lt;div style="color: black; font-weight: normal;"&gt;Chamois was one of the largest PHA families seen on Android to date and distributed through multiple channels. To the best of our knowledge Google is the first to publicly identify and track Chamois.&lt;/div&gt;&lt;/dl&gt;Chamois had a number of features that made it unusual, including:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Multi-staged payload&lt;/b&gt;: Its code is executed in 4 distinct stages using different file formats, as outlined in this diagram.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt; &lt;/ul&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="https://3.bp.blogspot.com/-WRxsTWw-i8M/WL2-DMgzb0I/AAAAAAAACdQ/BJkKvVq5YTITtn_ByEqr5ZVOAPI9go3JACLcB/s1600/Screen%2BShot%2B2017-03-06%2Bat%2B11.52.27%2BAM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="316" src="https://3.bp.blogspot.com/-WRxsTWw-i8M/WL2-DMgzb0I/AAAAAAAACdQ/BJkKvVq5YTITtn_ByEqr5ZVOAPI9go3JACLcB/s640/Screen%2BShot%2B2017-03-06%2Bat%2B11.52.27%2BAM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;This multi-stage process makes it more complicated to immediately identify apps in this family as a PHA because the layers have to be peeled first to reach the malicious part. However, Google's pipelines weren't tricked as they are designed to tackle these scenarios properly.&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;Self-protection&lt;/b&gt;: Chamois tried to evade detection using obfuscation and anti-analysis techniques, but our systems were able to counter them and detect the apps accordingly.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Custom encrypted storage&lt;/b&gt;: The family uses a custom, encrypted file storage for its configuration files and additional code that required deeper analysis to understand the PHA.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Size&lt;/b&gt;: Our security teams sifted through more than 100K lines of sophisticated code written by seemingly professional developers. Due to the sheer size of the APK, it took some time to understand Chamois in detail.&lt;/li&gt;&lt;/ul&gt;&lt;dl&gt;&lt;h3&gt; Google's approach to fighting PHAs&lt;/h3&gt;&lt;div style="color: black; font-weight: normal;"&gt;Verify Apps protects users from known PHAs by warning them when they are downloading an app that is determined to be a PHA, and it also enables users to uninstall the app if it has already been installed. Additionally, Verify Apps monitors the state of the Android ecosystem for anomalies and investigates the ones that it finds. It also helps finding unknown PHAs through behavior analysis on devices. For example, many apps downloaded by Chamois were highly ranked by the&amp;nbsp;&lt;a href="https://android-developers.googleblog.com/2017/01/findingmalware.html"&gt;DOI scorer&lt;/a&gt;. We have implemented rules in Verify Apps to protect users against Chamois.&lt;/div&gt;&lt;/dl&gt;Google continues to significantly invest in its counter-abuse technologies for Android and its ad systems, and we're proud of the work that many teams do behind the scenes to fight PHAs like Chamois.&lt;br /&gt;&lt;br /&gt;We hope this summary provides insight into the growing complexity of Android botnets. To learn more about Google's anti-PHA efforts and further ameliorate the risks they pose to users, devices, and ad systems, keep an eye open for the upcoming "Android Security 2016 Year In Review" report.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=Aph8BNrv2-w:EIR3qf0OSaw:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=Aph8BNrv2-w:EIR3qf0OSaw:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=Aph8BNrv2-w:EIR3qf0OSaw:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/Aph8BNrv2-w" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/7719000477691765789/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=7719000477691765789&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/7719000477691765789" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/7719000477691765789" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/Aph8BNrv2-w/detecting-and-eliminating-chamois-fraud.html" title="Detecting and eliminating Chamois, a fraud botnet on Android" /><author><name>Aaron Stein</name><uri>http://www.blogger.com/profile/15108814150912902439</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-uS190h3KH1k/WL29pCJd5fI/AAAAAAAACdM/7GUOagEOawQ8R3qXMGIbJ7__rxCdKM6ZQCLcB/s72-c/Screen%2BShot%2B2017-03-06%2Bat%2B11.50.30%2BAM.png" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/03/detecting-and-eliminating-chamois-fraud.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-3530372722013650056</id><published>2017-03-02T09:43:00.000-08:00</published><updated>2017-03-02T09:43:21.439-08:00</updated><title type="text">VRP news from Nullcon</title><content type="html">&lt;span class="byline-author"&gt;Posted by Josh Armour, Security Program Manager&lt;/span&gt;&lt;br /&gt;We’re thrilled to be joining the security research community at &lt;a href="http://nullcon.net/"&gt;Nullcon&lt;/a&gt; this week in Goa, India. This is a hugely important event for the &lt;a href="http://g.co/vrp"&gt;Google Vulnerability Rewards Program&lt;/a&gt;&amp;nbsp;and for our work with the security research community, more broadly. To mark the occasion, we wanted to share a few updates about the VRP.&lt;br /&gt;&lt;b&gt;Tougher bugs, bigger rewards&lt;/b&gt;&lt;br /&gt;Since the launch of our program in 2010, Google has offered a range of rewards: from $100 USD for low severity issues, up to $20,000 USD for critical vulnerabilities in our web properties (see &lt;a href="https://www.google.com/about/appsecurity/android-rewards/"&gt;Android&lt;/a&gt; and &lt;a href="https://www.google.com/about/appsecurity/chrome-rewards/"&gt;Chrome&lt;/a&gt; rewards). But, because high severity vulnerabilities have become harder to identify over the years, researchers have needed more time to find them. We want to demonstrate our appreciation for the significant time researchers dedicate to our program, and so we’re making some changes to our VRP.&lt;br /&gt;&lt;br /&gt;Starting today we will be increasing the reward for “Remote Code Execution” on the Google VRP from $20,000 USD to $31,337 USD. We are increasing the reward for “Unrestricted file system or database access” from $10,000 USD to $13,337 USD as well. Please check out the&amp;nbsp;&lt;a href="http://g.co/vrp"&gt;VRP site&lt;/a&gt;&amp;nbsp;for more details and specifics.&lt;br /&gt;&lt;br /&gt;Also, we are now donating rewards attributed to reports generated from our internal web security scanner; we have donated over $8000 to &lt;a href="http://rescue.org/"&gt;rescue.org&lt;/a&gt; this year so far. &lt;a href="https://cloud.google.com/security-scanner/"&gt;Cloud Security Scanner&lt;/a&gt; allows App Engine customers to utilize a version of the same tool.&lt;br /&gt;&lt;b&gt;Growing the security research community in India&lt;/b&gt;&lt;br /&gt;In&amp;nbsp;&lt;a href="https://security.googleblog.com/2017/01/vulnerability-rewards-program-2016-year.html"&gt;2016’s VRP Year in Review&lt;/a&gt;, we featured Jasminder Pal Singh, a longtime contributor who uses rewards to fund his startup, Jasminder Web Services Point. He’s emblematic of the vibrant and fast-growing computer security research community in India. We saw that new momentum reflected in last year’s VRP data: India was surpassed only by two other locations in terms of total individual researchers paid. We received reports from ~40% more Indian researchers (as compared to 2015) and gave out 30% more rewards which almost tripled the total, and doubled the average payout (both per researcher and per reward). We are excited to see this growth as all users of Google’s products benefit.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-jpNABMa0CMY/WLhTtvQnffI/AAAAAAAAIZ0/R92KJtjHxDYgg2Y1DLzsJFVWXFVrpcaeACLcB/s1600/Screen%2BShot%2B2017-03-02%2Bat%2B8.38.52%2BPM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="360" src="https://2.bp.blogspot.com/-jpNABMa0CMY/WLhTtvQnffI/AAAAAAAAIZ0/R92KJtjHxDYgg2Y1DLzsJFVWXFVrpcaeACLcB/s640/Screen%2BShot%2B2017-03-02%2Bat%2B8.38.52%2BPM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;Globally, we’ve noticed other&amp;nbsp;&lt;a href="https://sites.google.com/site/bughunteruniversity/behind-the-scenes/charts/2016"&gt;interesting trends&lt;/a&gt;. Russia has consistently occupied a position in the top 10 every year the last 7 years. We have noticed a 3X increase in reports from Asia, making up 70% of the Android Security Rewards for 2016. We have seen increases in the number of researchers reporting valid bugs from Germany (27%), and France (44%). France broke into our top 5 countries in 2016 for the first time.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-WCC-V-uVlY8/WLhUQ1MD0RI/AAAAAAAAIZ4/5et0RZqxE5cXUE8HjT0Kp_srYmbd91oTACLcB/s1600/Screen%2BShot%2B2017-03-02%2Bat%2B8.53.22%2BAM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="394" src="https://3.bp.blogspot.com/-WCC-V-uVlY8/WLhUQ1MD0RI/AAAAAAAAIZ4/5et0RZqxE5cXUE8HjT0Kp_srYmbd91oTACLcB/s640/Screen%2BShot%2B2017-03-02%2Bat%2B8.53.22%2BAM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;In 2016, we delivered technical talks along with educational trainings to an audience of enthusiastic security professionals in Goa at the Nullcon security conference. This year, we continue our investment at Nullcon to deliver&amp;nbsp;&lt;a href="http://nullcon.net/website/goa-2017/schedule.php#day1"&gt;content&lt;/a&gt;&amp;nbsp;focused on the growing group of bug hunters we see in India. If you are attending Nullcon please stop by and say “Hello”!&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=xmugQ1Udb2k:mTpUD2HMg5E:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=xmugQ1Udb2k:mTpUD2HMg5E:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=xmugQ1Udb2k:mTpUD2HMg5E:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/xmugQ1Udb2k" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/3530372722013650056/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=3530372722013650056&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/3530372722013650056" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/3530372722013650056" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/xmugQ1Udb2k/vrp-news-from-nullcon.html" title="VRP news from Nullcon" /><author><name>Aaron Stein</name><uri>http://www.blogger.com/profile/15108814150912902439</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-jpNABMa0CMY/WLhTtvQnffI/AAAAAAAAIZ0/R92KJtjHxDYgg2Y1DLzsJFVWXFVrpcaeACLcB/s72-c/Screen%2BShot%2B2017-03-02%2Bat%2B8.38.52%2BPM.png" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/03/vrp-news-from-nullcon.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-4426536163644080649</id><published>2017-03-01T10:06:00.000-08:00</published><updated>2017-03-01T10:06:51.904-08:00</updated><title type="text">Expanding protection for Chrome users on macOS</title><content type="html">&lt;span class="byline-author"&gt;Posted by Kylie McRoberts and Ryan Rasti&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="https://safebrowsing.google.com/"&gt;Safe Browsing&lt;/a&gt; is broadening its protection of macOS devices, enabling safer browsing experiences by improving defenses against unwanted software and malware targeting macOS. As a result, macOS users may start seeing more warnings when they navigate to dangerous sites or download dangerous files (example warning below).&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-4BSiHi_hE18/WLcMX4PAJ3I/AAAAAAAAAbg/TnU2PNWan-IA_NkBMMQ36w7zSlpPwEyewCLcB/s1600/pasted%2Bimage%2B0.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="452" src="https://3.bp.blogspot.com/-4BSiHi_hE18/WLcMX4PAJ3I/AAAAAAAAAbg/TnU2PNWan-IA_NkBMMQ36w7zSlpPwEyewCLcB/s640/pasted%2Bimage%2B0.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;As part of this next step towards reducing macOS-specific malware and unwanted software, Safe Browsing is focusing on two common abuses of browsing experiences: unwanted ad injection, and manipulation of Chrome user settings, specifically the start page, home page, and default search engine. Users deserve full control of their browsing experience and &lt;a href="https://www.google.com/about/company/unwanted-software-policy.html"&gt;Unwanted Software Policy&lt;/a&gt; violations hurt that experience.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;The recently released &lt;a href="https://developer.chrome.com/extensions/settings_override"&gt;Chrome Settings API for Mac&lt;/a&gt; gives developers the tools to make sure users stay in control of their Chrome settings. From here on, the Settings Overrides API will be the only approved path for making changes to Chrome settings on Mac OSX, like it currently is on Windows. Also, developers should know that only extensions hosted in the Chrome Web Store are allowed to make changes to Chrome settings.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Starting March 31 2017, Chrome and Safe Browsing will warn users about software that attempts to modify Chrome settings without using the API.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;For more information about the criteria we use to guide our efforts to protect Safe Browsing’s users, please visit our &lt;a href="https://support.google.com/webmasters/answer/3258249?hl=en"&gt;malware and unwanted software help center&lt;/a&gt;.&lt;/div&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=Pa-q-5araGA:g5gF5tSdalA:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=Pa-q-5araGA:g5gF5tSdalA:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=Pa-q-5araGA:g5gF5tSdalA:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/Pa-q-5araGA" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/4426536163644080649/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=4426536163644080649&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4426536163644080649" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4426536163644080649" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/Pa-q-5araGA/expanding-protection-for-chrome-users.html" title="Expanding protection for Chrome users on macOS" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-4BSiHi_hE18/WLcMX4PAJ3I/AAAAAAAAAbg/TnU2PNWan-IA_NkBMMQ36w7zSlpPwEyewCLcB/s72-c/pasted%2Bimage%2B0.png" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/03/expanding-protection-for-chrome-users.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-8445013370413925780</id><published>2017-02-24T11:23:00.000-08:00</published><updated>2017-02-24T14:57:37.714-08:00</updated><title type="text">E2EMail research project has left the nest</title><content type="html">&lt;span class="byline-author"&gt;Posted by KB Sriram, Eduardo Vela Nava, and Stephan Somogyi, Security and Privacy Engineering&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Whether they’re concerned about insider risks, compelled data disclosure demands, or other perceived dangers, some people prudently use end-to-end email encryption to limit the scope of systems they have to trust. The best-known method, PGP, has long been available in command-line form, as a plug-in for IMAP-based email clients, and it clumsily interoperates with Gmail by cut-and-paste. All these scenarios have demonstrated over 25 years that it’s too hard to use. Chromebook users also have never had a good solution; choosing between strong crypto and a strong endpoint device is unsatisfactory.&lt;br /&gt;&lt;br /&gt;These are some of the reasons we’ve continued working on the &lt;a href="https://security.googleblog.com/2014/06/making-end-to-end-encryption-easier-to.html"&gt;End-To-End research effort&lt;/a&gt;. One of the things we’ve done over the past year is add the resulting &lt;a href="https://github.com/e2email-org/e2email"&gt;E2EMail&lt;/a&gt; code to GitHub: E2EMail is not a Google product, it’s now a fully community-driven open source project, to which passionate security engineers from across the industry have already contributed.&lt;br /&gt;&lt;br /&gt;E2EMail offers one approach to integrating OpenPGP into Gmail via a Chrome Extension, with improved usability, and while carefully keeping all cleartext of the message body exclusively on the client. E2EMail is built on a proven, open source &lt;a href="https://vnhacker.blogspot.com/2014/06/why-javascript-crypto-is-useful.html"&gt;Javascript crypto&lt;/a&gt; library developed at Google.&lt;br /&gt;&lt;br /&gt;E2EMail in its current incarnation uses a bare-bones central keyserver for testing, but the recent &lt;a href="https://security.googleblog.com/2017/01/security-through-transparency.html"&gt;Key Transparency announcement&lt;/a&gt;&amp;nbsp;is crucial to its further evolution. Key discovery and distribution lie at the heart of the usability challenges that OpenPGP implementations have faced. Key Transparency delivers a solid, scalable, and thus practical solution, replacing the problematic &lt;a href="https://blog.filippo.io/giving-up-on-long-term-pgp/"&gt;web-of-trust&lt;/a&gt; model traditionally used with PGP.&lt;br /&gt;&lt;br /&gt;We look forward to working alongside the community to integrate E2EMail with the Key Transparency server, and beyond. If you’re interested in delving deeper, check out the &lt;a href="https://github.com/e2email-org/e2email"&gt;e2email-org/e2email&lt;/a&gt; repository on GitHub.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=ntPPqpmMYV0:JOY8lruMvYQ:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=ntPPqpmMYV0:JOY8lruMvYQ:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=ntPPqpmMYV0:JOY8lruMvYQ:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/ntPPqpmMYV0" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/8445013370413925780/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=8445013370413925780&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8445013370413925780" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8445013370413925780" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/ntPPqpmMYV0/e2email-research-project-has-left-nest_24.html" title="E2EMail research project has left the nest" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/02/e2email-research-project-has-left-nest_24.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-4437088076545312484</id><published>2017-02-23T05:00:00.000-08:00</published><updated>2017-02-23T15:14:43.129-08:00</updated><title type="text">Announcing the first SHA1 collision</title><content type="html">&lt;span class="byline-author"&gt;Posted by Marc Stevens (CWI Amsterdam), Elie Bursztein (Google), Pierre Karpman (CWI Amsterdam), Ange Albertini (Google), Yarik Markov (Google), Alex Petit Bianco (Google), Clement Baisse (Google)&lt;/span&gt;&lt;br /&gt;Cryptographic hash functions like SHA-1 are a cryptographer’s swiss army knife. You’ll find that hashes play a role in browser security, managing code repositories, or even just detecting duplicate files in storage. Hash functions compress large amounts of data into a small message digest. As a cryptographic requirement for wide-spread use, finding two messages that lead to the same digest should be computationally infeasible. Over time however, this requirement can fail due to &lt;a href="https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html"&gt;attacks on the mathematical underpinnings&lt;/a&gt; of hash functions or to increases in computational power.&lt;br /&gt;&lt;br /&gt;Today, more than 20 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision. This represents the culmination of two years of research that sprung from a collaboration between the &lt;a href="https://www.cwi.nl/"&gt;CWI Institute in Amsterdam&lt;/a&gt; and Google. We’ve summarized how we went about generating a collision below. As a proof of the attack, we are &lt;a href="https://shattered.it/"&gt;releasing two PDFs&lt;/a&gt; that have identical SHA-1 hashes but different content.&lt;br /&gt;&lt;br /&gt;For the tech community, our findings emphasize the necessity of sunsetting SHA-1 usage. Google has advocated the deprecation of SHA-1 for many years, particularly when it comes to signing TLS certificates. As early as 2014, the Chrome team &lt;a href="https://security.googleblog.com/2014/09/gradually-sunsetting-sha-1.html"&gt;announced&lt;/a&gt; that they would gradually phase out using SHA-1. We hope our practical attack on SHA-1 will cement that the protocol should no longer be considered secure.&lt;br /&gt;&lt;br /&gt;We hope that our practical attack against SHA-1 will finally convince the industry that it is urgent to move to safer alternatives such as SHA-256.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What is a cryptographic hash collision?&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-Ca6n5XsDQU4/WK6ljCSebeI/AAAAAAAAAa4/MXeyy0z13yIqp9DEWVLiqjJ_xSP2u7YOgCLcB/s1600/Collision-illustrated.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="347" src="https://3.bp.blogspot.com/-Ca6n5XsDQU4/WK6ljCSebeI/AAAAAAAAAa4/MXeyy0z13yIqp9DEWVLiqjJ_xSP2u7YOgCLcB/s640/Collision-illustrated.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;A collision occurs when two distinct pieces of data—a document, a binary, or a website’s certificate—hash to the same digest as shown above. In practice, collisions should never occur for secure hash functions. However if the hash algorithm has some flaws, as SHA-1 does, a well-funded attacker can craft a collision. The attacker could then use this collision to deceive systems that rely on hashes into accepting a malicious file in place of its benign counterpart. For example, two insurance contracts with drastically different terms.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Finding the SHA-1 collision&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;In 2013, &lt;a href="https://marc-stevens.nl/research/"&gt;Marc Stevens&lt;/a&gt; published a paper that outlined a theoretical approach to create a SHA-1 collision. We started by creating a &lt;a href="https://shattered.io/static/pdf_format.png"&gt;PDF prefix&lt;/a&gt; specifically crafted to allow us to generate two documents with arbitrary distinct visual contents, but that would hash to the same SHA-1 digest. In building this theoretical attack in practice we had to overcome some new challenges. We then leveraged Google’s technical expertise and cloud infrastructure to compute the collision which is one of the largest computations ever completed.&lt;br /&gt;&lt;br /&gt;Here are some numbers that give a sense of how large scale this computation was:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Nine quintillion (9,223,372,036,854,775,808) SHA1 computations in total&lt;/li&gt;&lt;li&gt;6,500 years of CPU computation to complete the attack first phase&lt;/li&gt;&lt;li&gt;110 years of GPU computation to complete the second phase&lt;/li&gt;&lt;/ul&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-x8LUESCGa_E/WK6lyE5xF9I/AAAAAAAAAa8/2IfgMaWbmgAkz1ZVIZ4Wpu73gTO3UE_EACLcB/s1600/complexity%2Bcompared.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="60" src="https://3.bp.blogspot.com/-x8LUESCGa_E/WK6lyE5xF9I/AAAAAAAAAa8/2IfgMaWbmgAkz1ZVIZ4Wpu73gTO3UE_EACLcB/s640/complexity%2Bcompared.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;While those numbers seem very large, the SHA-1 shattered attack is still more than 100,000 times faster than a brute force attack which remains impractical.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Mitigating the risk of SHA-1 collision attacks&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Moving forward, it’s more urgent than ever for security practitioners to migrate to safer cryptographic hashes such as SHA-256 and SHA-3. Following &lt;a href="https://security.googleblog.com/2015/02/feedback-and-data-driven-updates-to.html"&gt;Google’s vulnerability disclosure policy&lt;/a&gt;, we will wait 90 days before releasing code that allows anyone to create a pair of PDFs that hash to the same SHA-1 sum given two distinct images with some pre-conditions. In order to prevent this attack from active use, we’ve added protections for Gmail and GSuite users that detects our PDF collision technique. Furthermore, we are providing a &lt;a href="http://shattered.io/"&gt;free detection system&lt;/a&gt; to the public.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;You can find more details about the SHA-1 attack and detailed research outlining our techniques &lt;a href="https://shattered.io/"&gt;here&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;About the team&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;This result is the product of a long-term collaboration between the CWI institute and Google’s Research security, privacy and anti-abuse group.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="https://marc-stevens.nl/research/"&gt;Marc Stevens&lt;/a&gt; and &lt;a href="https://www.elie.net/"&gt;Elie Bursztein&lt;/a&gt; started collaborating on making Marc’s cryptanalytic attacks against SHA-1 practical using Google infrastructure. &lt;a href="http://corkami.github.io/"&gt;Ange Albertini&lt;/a&gt; developed the PDF attack, &lt;a href="http://pages.saclay.inria.fr/pierre.karpman/"&gt;Pierre Karpman&lt;/a&gt; worked on the cryptanalysis and the GPU implementation, &lt;a href="https://www.ymarkov.me/"&gt;Yarik Markov&lt;/a&gt; took care of the distributed GPU code, &lt;a href="http://serialhacker.org/"&gt;Alex Petit Bianco&lt;/a&gt; implemented the collision detector to protect Google users and Clement Baisse oversaw the reliability of the computations.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-dOYNrXyS9NQ/WK6l__AnOoI/AAAAAAAAAbA/JWAAlziN0RIfHBkzEJ1KobxRzcwKWii3wCLcB/s1600/shattered-infographic.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://2.bp.blogspot.com/-dOYNrXyS9NQ/WK6l__AnOoI/AAAAAAAAAbA/JWAAlziN0RIfHBkzEJ1KobxRzcwKWii3wCLcB/s1600/shattered-infographic.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=x34uNz0bnPc:RlUplBoUlSQ:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=x34uNz0bnPc:RlUplBoUlSQ:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=x34uNz0bnPc:RlUplBoUlSQ:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/x34uNz0bnPc" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/4437088076545312484/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=4437088076545312484&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4437088076545312484" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/4437088076545312484" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/x34uNz0bnPc/announcing-first-sha1-collision.html" title="Announcing the first SHA1 collision" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-Ca6n5XsDQU4/WK6ljCSebeI/AAAAAAAAAa4/MXeyy0z13yIqp9DEWVLiqjJ_xSP2u7YOgCLcB/s72-c/Collision-illustrated.png" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/02/announcing-first-sha1-collision.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-1927932461263264772</id><published>2017-02-21T14:00:00.000-08:00</published><updated>2017-02-21T15:28:31.003-08:00</updated><title type="text">Another option for file sharing</title><content type="html">&lt;span class="byline-author"&gt;Posted by Andrew Gerrand, Eric Grosse, Rob Pike, Eduardo Pinheiro and Dave Presotto, Google Software Engineers&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Existing mechanisms for file sharing are so fragmented that people waste time on multi-step copying and repackaging. With the new project &lt;a href="https://upspin.io/"&gt;Upspin&lt;/a&gt;, we aim to improve the situation by providing a global name space to name all your files. Given an Upspin name, a file can be shared securely, copied efficiently without "download" and "upload", and accessed by anyone with permission from anywhere with a network connection.&lt;br /&gt;&lt;br /&gt;Our target audience is personal users, families, or groups of friends. Although Upspin might have application in enterprise environments, we think that focusing on the consumer case enables easy-to-understand and easy-to-use sharing.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;File names begin with the user's email address followed by a slash-separated Unix-like path name:&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;ann@example.com/dir/file.&lt;/span&gt;&lt;/div&gt;Any user with appropriate permission can access the contents of this file by using Upspin services to evaluate the full path name, typically via a FUSE filesystem so that unmodified applications just work. Upspin names usually identify regular static files and directories, but may point to dynamic content generated by devices such as sensors or services.&lt;br /&gt;&lt;br /&gt;If the user wishes to share a directory (the unit at which sharing privileges are granted), she adds a file called Access to that directory. In that file she describes the rights she wishes to grant and the users she wishes to grant them to. For instance,&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;read: joe@here.com, mae@there.com&lt;/span&gt;&lt;/div&gt;allows Joe and Mae to read any of the files in the directory holding the Access file, and also in its subdirectories. As well as limiting who can fetch bytes from the server, this access is enforced end-to-end cryptographically, so cleartext only resides on Upspin clients, and use of cloud storage does not extend the trust boundary.&lt;br /&gt;&lt;br /&gt;Upspin looks a bit like a global file system, but its real contribution is a set of interfaces, protocols, and components from which an information management system can be built, with properties such as security and access control suited to a modern, networked world. Upspin is not an "app" or a web service, but rather a suite of software components, intended to run in the network and on devices connected to it, that together provide a secure, modern information storage and sharing network. Upspin is a layer of infrastructure that other software and services can build on to facilitate secure access and sharing. This is an open source contribution, not a Google product. We have not yet integrated with the &lt;a href="https://security.googleblog.com/2017/01/security-through-transparency.html"&gt;Key Transparency&lt;/a&gt; server, though we expect to eventually, and for now use a similar technique of securely publishing all key updates. File storage is inherently an archival medium without forward secrecy; loss of the user's encryption keys implies loss of content, though we do provide for key rotation.&lt;br /&gt;&lt;br /&gt;It’s early days, but we’re encouraged by the progress and look forward to feedback and contributions. To learn more, see the GitHub repository at &lt;a href="https://github.com/upspin"&gt;upspin&lt;/a&gt;.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=W5g1j7KCdLs:7yth_tP26dU:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=W5g1j7KCdLs:7yth_tP26dU:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=W5g1j7KCdLs:7yth_tP26dU:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/W5g1j7KCdLs" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/1927932461263264772/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=1927932461263264772&amp;isPopup=true" title="3 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/1927932461263264772" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/1927932461263264772" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/W5g1j7KCdLs/another-option-for-file-sharing.html" title="Another option for file sharing" /><author><name>Aaron Stein</name><uri>http://www.blogger.com/profile/15108814150912902439</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>3</thr:total><feedburner:origLink>http://security.googleblog.com/2017/02/another-option-for-file-sharing.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-8333266298064455807</id><published>2017-02-16T15:15:00.000-08:00</published><updated>2017-02-16T15:15:00.895-08:00</updated><title type="text">Understanding differences between corporate and consumer Gmail threats</title><content type="html">&lt;span class="byline-author"&gt;Posted by Ali Zand and Vijay Eranti, Anti-Abuse Research and Gmail Abuse&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We are constantly working to protect our users, and quickly adapt to new online threats. This work never stops: every minute, we prevent over 10 million unsafe or unwanted emails from reaching Gmail users and threatening them with malicious attachments that infect a user’s machine if opened, &lt;a href="https://security.googleblog.com/2017/02/better-and-more-usable-protection-from.html"&gt;phishing messages&lt;/a&gt; asking for banking or account details, and omnipresent &lt;a href="https://gmail.googleblog.com/2015/07/the-mail-you-want-not-spam-you-dont.html"&gt;spam&lt;/a&gt;. A cornerstone of our defense is understanding the pulse of the email threat landscape. This awareness helps us to anticipate and react faster to emerging attacks.&lt;br /&gt;&lt;br /&gt;Today at RSA, we are sharing key insights about the diversity of threats to corporate Gmail inboxes. We’ve highlighted some of our key findings below; you can see our full presentation &lt;a href="https://www.slideshare.net/elie-bursztein/targeted-attacks-against-corporate-inboxes-a-gmail-perspective-rsa-2017"&gt;here&lt;/a&gt;. We’ve already incorporated these insights to help keep our G Suite users safe, and we hope that by exposing these nuances, security and abuse professionals everywhere can better understand their risk profile and customize their defenses accordingly.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;How threats to corporate and consumer inboxes differ&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;While spam may be the most common attack across all inboxes, did you know that malware and phishing are far more likely to target corporate users? Here’s a breakdown of how attacks stack up for corporate vs. personal inboxes:&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;span id="docs-internal-guid-549fc71e-492c-5e9e-9230-261419e91a50"&gt;&lt;span style="font-family: Arial; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;"&gt;&lt;img alt="logo.png" height="303" src="https://lh3.googleusercontent.com/FMzJ1GUgaIbB2B4P2q8wyp4sebmHwOYMI3lQc2A3689aqbSwZ8-UFEoOiFbuIJhuXFP5S71-jufkSEHpBGjYB4O9nYng5UmfYXJGwUr_YgWbnrG8rxWt-kGRBHKVITEEBDDFTWIt" style="border: none; transform: rotate(0rad);" width="334" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span&gt;&lt;span style="font-family: Arial; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;b&gt;Different threats to different types of organizations&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;Attackers appear to choose targets based on multiple dimensions, such as the size and the type of the organization, its country of operation, and the organization’s sector of activity. Let’s look at an example of corporate users across businesses, nonprofits, government-related industries, and education services. If we consider business inboxes as a baseline, we find attackers are far more likely to target nonprofits with malware, while attackers are more likely to target businesses with phishing and spam.&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span id="docs-internal-guid-549fc71e-4931-a1e6-af6a-e1a3125e97ce"&gt;&lt;span style="font-family: Arial; font-size: 10pt; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; vertical-align: baseline; white-space: pre-wrap;"&gt;&lt;img alt="histogram.png" height="262" src="https://lh6.googleusercontent.com/wHHeoWWPulcGoeJd-DfXJ00_W_FQaTxwXmXTyMyiYAnoYMvtRdTe_WO2L7pYZSkZd3xplggPD3xi00GdwI94fckd5-NCqzuwBok2Bm5d-zKMJNQTbfAONcWRR5MpYM0Ir4IIhge4" style="border: none; transform: rotate(0rad);" width="506" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;These nuances go all the way down to the granularity of country and industry type. This shows how security and abuse professionals must tailor defenses based on their personalized threat model, where no single corporate user faces the same attacks.&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;b&gt;Constant improvements to corporate Gmail protections&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;Research like this enables us to better protect our users. We are constantly innovating to better protect our users, and we've already implemented these findings into our G Suite protections. Additionally, we have implemented and rolled out several features that help our users stay safe against these ever-evolving threats.&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;The forefront of our defenses is a state-of-the-art email classifier that detects abusive &lt;a href="https://gmail.googleblog.com/2015/07/the-mail-you-want-not-spam-you-dont.html"&gt;messages with 99.9% accuracy&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;To protect yourself from unsafe websites, make sure to heed &lt;a href="https://gsuiteupdates.googleblog.com/2016/08/making-email-safer-with-new-security-warnings-in-gmail.html"&gt;interstitial warnings&lt;/a&gt; that alert you of potential phishing and malware attacks.&lt;/li&gt;&lt;li&gt;Use many layers of defense: we recommend using a &lt;a href="https://blog.google/products/g-suite/advanced-controls-for-gsuite/"&gt;security key enforcement&lt;/a&gt; (2-step verification) to thwart attackers from accessing your account in the event of a stolen password.&lt;/li&gt;&lt;li&gt;To ensure your email contents’ stays safe and secure in transit, use our &lt;a href="https://security.googleblog.com/2017/02/hosted-smime-by-google-provides.html"&gt;hosted S/MIME&lt;/a&gt; feature.&lt;/li&gt;&lt;li&gt;Use our &lt;a href="https://blog.google/products/gmail/making-email-safer-for-you-posted-by/"&gt;TLS encryption indicator&lt;/a&gt;, to ensure only the intended recipient can read your email.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;We will never stop working to keep our users and their inboxes secure. To learn more about how we protect Gmail, check out this YouTube video that summarizes the lessons we learned while protecting Gmail users through the years.&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=oAeEBw0n9-s:hMGMFmC9LWQ:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=oAeEBw0n9-s:hMGMFmC9LWQ:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=oAeEBw0n9-s:hMGMFmC9LWQ:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/oAeEBw0n9-s" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/8333266298064455807/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=8333266298064455807&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8333266298064455807" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/8333266298064455807" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/oAeEBw0n9-s/understanding-differences-between.html" title="Understanding differences between corporate and consumer Gmail threats" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/02/understanding-differences-between.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-2911226784091629306</id><published>2017-02-07T10:54:00.000-08:00</published><updated>2017-02-07T13:30:43.401-08:00</updated><title type="text">802.11s Security and Google Wifi</title><content type="html">&lt;span class="byline-author"&gt;Posted by Paul Devitt, Security Engineer&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Making sure your home network and information stay secure is our top priority. So when we launched the Google OnHub home router in 2015, we made sure &lt;a href="https://on.google.com/hub/blog/2016-09-27/onhub-powerful-protection-for-peace-of-mind/"&gt;security was baked into its core&lt;/a&gt;. In 2016 we took all we learned from OnHub and made it even better by adding mesh support with the introduction of &lt;a href="https://madeby.google.com/wifi/"&gt;Google Wifi&lt;/a&gt;.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Secure to the core - Always&lt;/b&gt;&lt;br /&gt;The primary mechanism to making sure your Wifi points stay safe is our verified boot mechanism. The operating system and code that your OnHub and Google Wifi run are guaranteed to have been signed by Google. Both OnHub and Google Wifi use &lt;a href="https://www.chromium.org/chromium-os/developer-information-for-chrome-os-devices/custom-firmware"&gt;Coreboot and Depthcharge&lt;/a&gt; from ChromeOS and ensure system integrity by implementing &lt;a href="https://source.android.com/security/verifiedboot/"&gt;DM-Verity&lt;/a&gt; from Android. To secure Userspace, we use process isolation with &lt;a href="https://blog.chromium.org/2012/11/a-safer-playground-for-your-linux-and.html"&gt;Seccomp-BPF&lt;/a&gt; and a strict set of policies.&lt;br /&gt;&lt;br /&gt;On the software side, Google Wifi and OnHub are subject to &lt;a href="https://security.googleblog.com/2016/08/guided-in-process-fuzzing-of-chrome.html"&gt;expansive fuzz testing&lt;/a&gt; of major components and functions. The continual improvements found by fuzzing are fed into Google Wifi and OnHub, and are made available through the regular automatic updates, secured by Google’s cloud.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;802.11s Security for WiFi&lt;/b&gt;&lt;br /&gt;In 2016 with the launch of Google Wifi, we introduced &lt;a href="https://blog.google/products/google-wifi/making-mesh-your-wi-fi/"&gt;802.11s mesh technology&lt;/a&gt; to the home router space. The result is a system where multiple Wifi Points work together to create blanket coverage. The specification for 802.11s recommends that appropriate security steps be taken, but doesn’t strictly define them for people to use. We spent significant time in building a security model into our implementation of 802.11s that Google WiFi and OnHub could use so that your network is always comprised of exactly the devices you expect.&lt;br /&gt;&lt;br /&gt;As each mesh node within the network will need to speak securely to its neighboring nodes, it's imperative that a secure method, which is isolated from the user, is established to form those links. Each Wifi node establishes a separate encrypted channel with its neighbors and the primary node. On any major network topology change (such as a node being factory reset, a node added, or an event where an unexpected node joins the network), the mesh will undergo a complete cycling of the encryption keys. Each node will establish and test a new set of keys with its respective neighbors, verify that it has network connectivity and then the network as a whole will transition to the new keys.&lt;br /&gt;&lt;br /&gt;These mesh encryption keys are generated locally on your devices and are never transmitted outside of your local network. In the event that a key has been discovered outside of your local network, a rekeying operation will be triggered. The rekeying operations allow for the mesh network to be fully flexible to the user’s desire and maintain a high level of security for devices communicating across it.&lt;br /&gt;&lt;b&gt;Committed to security&lt;/b&gt;&lt;br /&gt;We have an ongoing commitment to the security of Google Wifi and OnHub. Both devices participate in the &lt;a href="https://www.google.com/about/appsecurity/reward-program/"&gt;Google Vulnerability Rewards Program (VRP)&lt;/a&gt; and eligible bugs can be rewarded up to $20,000 (U.S). We’re always looking to raise the bar to help our users be secure online.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=x-jbBhMIa7M:SgWjgxTIpls:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=x-jbBhMIa7M:SgWjgxTIpls:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=x-jbBhMIa7M:SgWjgxTIpls:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/x-jbBhMIa7M" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/2911226784091629306/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=2911226784091629306&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/2911226784091629306" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/2911226784091629306" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/x-jbBhMIa7M/80211s-security-and-google-wifi.html" title="802.11s Security and Google Wifi" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/02/80211s-security-and-google-wifi.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-3005559841577872766</id><published>2017-02-02T07:30:00.000-08:00</published><updated>2017-02-02T07:30:36.114-08:00</updated><title type="text">Hosted S/MIME by Google provides enhanced security for Gmail in the enterprise</title><content type="html">&lt;span class="byline-author"&gt;Posted by Nicolas Kardas, Gmail Product Management and Nicolas Lidzborski, G Suite Security Engineering Lead&lt;/span&gt;&lt;br /&gt;We are constantly working to meet the needs of our enterprise customers, including enhanced security for their communications. Our aim is to offer a secure method to transport sensitive information despite &lt;a href="https://security.googleblog.com/2015/11/new-research-encouraging-trends-and.html"&gt;insecure channels with email today&lt;/a&gt; and without compromising Gmail extensive protections for spam, phishing and malware.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Why hosted S/MIME?&lt;/b&gt;&lt;br /&gt;Client-side &lt;a href="https://tools.ietf.org/html/rfc5751"&gt;S/MIME&lt;/a&gt; has been around for many years. However, its adoption has been limited because it is difficult to deploy (end users have to manually install certificates to their email applications) and the underlying email service cannot efficiently protect against spam, malware and phishing because client-side S/MIME makes the email content opaque.&lt;br /&gt;&lt;br /&gt;With Google’s new hosted S/MIME solution, once an incoming encrypted email with S/MIME is received, it is stored using &lt;a href="https://services.google.com/fh/files/helpcenter/google_encryptionwp2016.pdf"&gt;Google's encryption&lt;/a&gt;. This means that all normal processing of the email can happen, including extensive protections for spam/phishing/malware, admin services (such as vault retention, auditing and email routing rules), and high value end user features such as mail categorization, advanced search and &lt;a href="https://blog.google/products/gmail/computer-respond-to-this-email/"&gt;Smart Reply&lt;/a&gt;. For the vast majority of emails, this is the safest solution - giving the benefit of strong authentication and encryption in transit - without losing the safety and features of Google's processing.&lt;br /&gt;&lt;br /&gt;Using hosted S/MIME provides an added layer of security compared to using SMTP over TLS to send emails. TLS only guarantees to the sender’s service that the first hop transmission is encrypted and to the recipient that the last hop was encrypted. But in practice, emails often take many hops (through forwarders, mailing lists, relays, appliances, etc). With hosted S/MIME, the message itself is encrypted. This facilitates secure transit all the way down to the recipient’s mailbox.&lt;br /&gt;&lt;br /&gt;S/MIME also adds verifiable account-level signatures authentication (versus only domain-based signature with DKIM). This means that email receivers can ensure that incoming email is actually from the sending account, not just a matching domain, and that the message has not been tampered with after it was sent.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;How to use hosted S/MIME?&lt;/b&gt;&lt;br /&gt;S/MIME requires every email address to have a suitable certificate attached to it. By default, Gmail requires the certificate to be from a publicly trusted root Certificate Authority (CA) which meets &lt;a href="https://support.google.com/a/answer/7300887"&gt;strong cryptographic standards&lt;/a&gt;. System administrators will have the option to lower these requirements for their domains.&lt;br /&gt;&lt;br /&gt;To use hosted S/MIME, companies need to upload their own certificates (with private keys) to Gmail, which can be done by end users via Gmail settings or by admins in bulk via the Gmail API.&lt;br /&gt;&lt;br /&gt;From there, using hosted S/MIME is a seamless experience for end users. When receiving a digitally signed message, Gmail automatically associates the public key with the contact of the sender. By default, Gmail automatically signs and encrypts outbound messages if there is a public S/MIME key available for the recipient. Although users have the option to manually remove encryption, admins can set up rules that override their action.&lt;br /&gt;&lt;br /&gt;Hosted S/MIME is supported on Gmail web/iOS/Android, on Inbox and on clients connected to the Gmail service via IMAP. Users can exchange signed and encrypted emails with recipients using hosted S/MIME or client-side S/MIME.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Which companies should consider using hosted S/MIME?&lt;/b&gt;&lt;br /&gt;Hosted S/MIME provides a solution that is easy to manage for administrators and seamless for end users. Companies that want security in transit and digital signature/non-repudiation at the account level should consider using hosted S/MIME. This is a need for many companies working with sensitive/confidential information.&lt;br /&gt;&lt;br /&gt;Hosted S/MIME is available for &lt;a href="https://support.google.com/a/answer/7284269"&gt;G Suite Enterprise edition&lt;/a&gt; users.&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=ry6pyc8A2sU:IiwzpLY4roU:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=ry6pyc8A2sU:IiwzpLY4roU:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=ry6pyc8A2sU:IiwzpLY4roU:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/ry6pyc8A2sU" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/3005559841577872766/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=3005559841577872766&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/3005559841577872766" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/3005559841577872766" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/ry6pyc8A2sU/hosted-smime-by-google-provides.html" title="Hosted S/MIME by Google provides enhanced security for Gmail in the enterprise" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/02/hosted-smime-by-google-provides.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-6645636695247716261</id><published>2017-02-01T09:50:00.000-08:00</published><updated>2017-02-01T10:01:31.270-08:00</updated><title type="text">Better and more usable protection from phishing</title><content type="html">&lt;span class="byline-author"&gt;Posted by Christiaan Brand and Guemmy Kim, Product Managers, Google Account Security&lt;/span&gt;&lt;br /&gt;Despite constant advancements in online safety, phishing — one of the web’s oldest and simplest attacks — remains a tough challenge for the security community. Subtle tricks and good old-fashioned con-games can cause even the most security-conscious users to reveal their passwords or other personal information to fraudsters.&lt;br /&gt;&lt;b&gt;New advancements in phishing protection&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;This is why we’re excited about the &lt;a href="https://gsuiteupdates.googleblog.com/2017/01/g-suite-builds-momentum-with-enterprise.html"&gt;news for G Suite customers&lt;/a&gt;: the launch of Security Key enforcement. Now, G Suite administrators can better protect their employees by enabling Two-Step Verification (2SV) using &lt;i&gt;only&lt;/i&gt; Security Keys as the second factor, making this protection the norm rather than just an option. 2SV with only a Security Key offers the highest level of protection from phishing. Instead of entering a unique code as a second factor at sign-in, Security Keys send us cryptographic proof that users are on a legitimate Google site and that they have their Security Keys with them. Since most hijackers are remote, their efforts are thwarted because they cannot get physical possession of the Security Key.&lt;br /&gt;&lt;br /&gt;Users can also take advantage of new &lt;a href="https://support.google.com/accounts/answer/6103523"&gt;Bluetooth low energy (BLE) Security Key support&lt;/a&gt;, which makes using 2SV Security Key protection easier on mobile devices. BLE Security Keys, which work on both Android and iOS, improve upon the usability of other form factors.&lt;br /&gt;&lt;b&gt;A long history of phishing protections&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;We’ve helped protect users from phishing for many years. We rolled out 2SV back in 2011, and later strengthened it in 2014 with the&lt;a href="https://security.googleblog.com/2014/10/strengthening-2-step-verification-with.html"&gt; addition of Security Keys&lt;/a&gt;. These launches complement our many layers of phishing protections —&amp;nbsp;&lt;a href="https://safebrowsing.google.com/"&gt;Safe Browsing warnings&lt;/a&gt;, &lt;a href="https://gmail.googleblog.com/2007/07/thanks-for-all-spam-reports.html"&gt;Gmail spam filters&lt;/a&gt;, and &lt;a href="https://support.google.com/accounts/answer/7162782"&gt;account sign-in challenges&lt;/a&gt;&amp;nbsp;— as well as our work with industry groups like the &lt;a href="https://fidoalliance.org/"&gt;FIDO Alliance&lt;/a&gt; and &lt;a href="https://www.m3aawg.org/"&gt;M3AAWG&lt;/a&gt; to develop standards and combat phishing across the industry. In the coming months, we’ll build on these protections and offer users the opportunity to further protect their personal Google Accounts.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=OM3rrDC8FWo:uYSHqbRBlWQ:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=OM3rrDC8FWo:uYSHqbRBlWQ:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=OM3rrDC8FWo:uYSHqbRBlWQ:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/OM3rrDC8FWo" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/6645636695247716261/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=6645636695247716261&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/6645636695247716261" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/6645636695247716261" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/OM3rrDC8FWo/better-and-more-usable-protection-from.html" title="Better and more usable protection from phishing" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/02/better-and-more-usable-protection-from.html</feedburner:origLink></entry><entry><id>tag:blogger.com,1999:blog-1176949257541686127.post-1019020675242180974</id><published>2017-01-30T09:00:00.000-08:00</published><updated>2017-01-30T09:09:50.400-08:00</updated><title type="text">Vulnerability Rewards Program: 2016 Year in Review</title><content type="html">&lt;span class="byline-author"&gt;Posted by Eduardo Vela Nava, VRP Technical Lead, Master of Disaster&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We created our Vulnerability Rewards Program in 2010 because researchers should be rewarded for protecting our users. Their discoveries help keep our users, and the internet at large, as safe as possible.&lt;br /&gt;&lt;br /&gt;The amounts we award vary, but our message to researchers does not; each one represents a sincere ‘thank you’.&lt;br /&gt;&lt;br /&gt;As we have for &lt;a href="https://security.googleblog.com/2015/01/security-reward-programs-year-in-review.html"&gt;2014&lt;/a&gt; and &lt;a href="https://security.googleblog.com/2016/01/google-security-rewards-2015-year-in.html"&gt;2015&lt;/a&gt;, we’re again sharing a yearly wrap-up of the Vulnerability Rewards Program.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-dSLuriKp5vE/WI7PHcSiEGI/AAAAAAAAAZ0/w5YE5vAlEAcl13N1SE6LXQuiq3nUUX0VwCLcB/s1600/VRP%2B2016.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="640" src="https://1.bp.blogspot.com/-dSLuriKp5vE/WI7PHcSiEGI/AAAAAAAAAZ0/w5YE5vAlEAcl13N1SE6LXQuiq3nUUX0VwCLcB/s640/VRP%2B2016.jpg" width="425" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;b&gt;What was new?&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;In short — a lot. Here’s a quick rundown:&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Previously by-invitation only, we opened up &lt;a href="https://www.google.com/about/appsecurity/chrome-rewards/index.html#fuzzerprogram"&gt;Chrome's Fuzzer Program&lt;/a&gt; to submissions from the public. The program allows researchers to run &lt;a href="https://en.wikipedia.org/wiki/Fuzzing"&gt;fuzzers&lt;/a&gt; at large scale, across thousands of cores on Google hardware, and receive reward payments automatically.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;On the product side, we saw amazing contributions from Android researchers all over the world, less than a year after Android launched its VRP. We also expanded our overall VRP to include more products, including OnHub and Nest devices.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;We increased our presence at events around the world, like &lt;a href="http://blog.trendmicro.com/pwn2own-contest-reveals-bugs-in-safari-edge/"&gt;pwn2own&lt;/a&gt; and &lt;a href="http://pwnfest.org/"&gt;Pwnfest&lt;/a&gt;. The vulnerabilities responsibly disclosed at these events enabled us to quickly provide fixes to the ecosystem and keep customers safe. At both events, we were able to close down a vulnerability in Chrome within days of being notified of the issue.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;b&gt;Stories that stood out&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;As always, there was no shortage of inspiring, funny, and quirky anecdotes from the 2016 year in VRP.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;We met Jasminder Pal Singh at Nullcon in India. Jasminder is a long-time contributor to the VRP, but this research is a side project for him. He spends most of his time growing &lt;a href="https://webservicespoint.com/about"&gt;Jasminder Web Services Point&lt;/a&gt;, the startup he operates with six other colleagues and friends. The team consists of: two web developers, one graphic designer, a developer for Android and iOS respectively, one Linux administrator, and a Content Manager/Writer. Jasminder’s VRP rewards fund the startup. The number of reports we receive from researchers in India is growing, and we’re growing the VRP’s presence there with additional conference sponsorships, trainings, and more.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-YIuorlWPDUU/WI7SKoBNBbI/AAAAAAAAAaI/bbP-1m3-OvAreGrbM7IYNgqhGq0beeWlQCLcB/s1600/Jasminder%2B%252B%2Bteam.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="425" src="https://3.bp.blogspot.com/-YIuorlWPDUU/WI7SKoBNBbI/AAAAAAAAAaI/bbP-1m3-OvAreGrbM7IYNgqhGq0beeWlQCLcB/s640/Jasminder%2B%252B%2Bteam.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;Jasminder (back right) and his team&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Jon Sawyer worked with his colleague Sean Beaupre from Streamlined Mobile Solutions, and friend Ben Actis to submit three Android vulnerability reports. A resident of &lt;a href="https://www.google.com/maps/place/Clallam+County,+WA/data=!4m2!3m1!1s0x548e46dad814593b:0x1ee9bbf264a0252f?sa=X&amp;amp;ved=0ahUKEwjm4MP8xs7RAhXrqVQKHS3HBP0Q8gEIfzAP"&gt;Clallam County, Washington&lt;/a&gt;, Jon donated their $8,000 reward to their local Special Olympics team, the Orcas. Jon told us the reward was particularly meaningful because his son, Benji, plays on the team. He said: &lt;i&gt;“Special Olympics provides a sense of community, accomplishment, and free health services at meets. They do incredible things for these people, at no cost for the athletes or their parents. Our donation is going to supply them with new properly fitting uniforms, new equipment, cover some facility rental fees (bowling alley, gym, track, swimming pool) and most importantly help cover the biggest cost, transportation.”&lt;/i&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class="separator" style="clear: both; font-style: italic; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-59wUp0M-iwg/WI7T9icocBI/AAAAAAAAAaU/aSd1dDDJyfMIo-zBInzHTfmJaeXOekVbgCLcB/s1600/Clallam%2BCounty%2BOrcas.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="425" src="https://4.bp.blogspot.com/-59wUp0M-iwg/WI7T9icocBI/AAAAAAAAAaU/aSd1dDDJyfMIo-zBInzHTfmJaeXOekVbgCLcB/s640/Clallam%2BCounty%2BOrcas.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;ul&gt;&lt;li&gt;VRP researchers sometimes attach videos that demonstrate the bug. While making a great proof-of-concept video is a skill in itself, our researchers raised it to another level this year. Check out this video Frans Rosén sent us. It’s perfectly synchronized to the background music! We hope this trend continues in 2017 ;-)&lt;/li&gt;&lt;/ul&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/YdXkw3DwDd4/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/YdXkw3DwDd4?feature=player_embedded" width="320"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Researchers’ individual contributions, and our relationship with the community, have never been more important. A hearty thank you to everyone that contributed to the VRP in 2016 — we’re excited to work with you (and others!) in 2017 and beyond.&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;*Josh Armour (&lt;a href="https://www.google.com/about/appsecurity/reward-program/"&gt;VRP Program Manager&lt;/a&gt;), Andrew Whalley (&lt;a href="https://www.google.com/about/appsecurity/chrome-rewards/"&gt;Chrome VRP&lt;/a&gt;), and Quan To (&lt;a href="https://www.google.com/about/appsecurity/android-rewards/"&gt;Android VRP&lt;/a&gt;) contributed mightily to help lead these Google-wide efforts.&lt;/div&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=f-eKw6sNDrM:MCHYW_pO_jY:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt; &lt;a href="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?a=f-eKw6sNDrM:MCHYW_pO_jY:V_sGLiPBpWU"&gt;&lt;img src="http://feeds.feedburner.com/~ff/GoogleOnlineSecurityBlog?i=f-eKw6sNDrM:MCHYW_pO_jY:V_sGLiPBpWU" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/GoogleOnlineSecurityBlog/~4/f-eKw6sNDrM" height="1" width="1" alt=""/&gt;</content><link rel="replies" type="application/atom+xml" href="http://security.googleblog.com/feeds/1019020675242180974/comments/default" title="Post Comments" /><link rel="replies" type="text/html" href="http://www.blogger.com/comment.g?blogID=1176949257541686127&amp;postID=1019020675242180974&amp;isPopup=true" title="0 Comments" /><link rel="edit" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/1019020675242180974" /><link rel="self" type="application/atom+xml" href="http://www.blogger.com/feeds/1176949257541686127/posts/default/1019020675242180974" /><link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/f-eKw6sNDrM/vulnerability-rewards-program-2016-year.html" title="Vulnerability Rewards Program: 2016 Year in Review" /><author><name>Google Security PR</name><uri>http://www.blogger.com/profile/06353467523789091437</uri><email>noreply@blogger.com</email><gd:image rel="http://schemas.google.com/g/2005#thumbnail" width="16" height="16" src="http://img1.blogblog.com/img/b16-rounded.gif" /></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-dSLuriKp5vE/WI7PHcSiEGI/AAAAAAAAAZ0/w5YE5vAlEAcl13N1SE6LXQuiq3nUUX0VwCLcB/s72-c/VRP%2B2016.jpg" height="72" width="72" /><thr:total>0</thr:total><feedburner:origLink>http://security.googleblog.com/2017/01/vulnerability-rewards-program-2016-year.html</feedburner:origLink></entry></feed>
