Google 'to give Android users better security controls'

Search giant may give mobile users better app permissions controls

The rear of an Android smartphone including its camera

Android users may soon be able to decide just how much of their information their apps can access, with Google reportedly ready to introduce tighter security controls.

The search giant's mobile operating system is set to hand users more power over what personal information remains private, and which apps can access their data, according to Bloomberg.

The publication cited sources familiar with the matter, saying the controls would cover photos, contacts and location, with Android users able to better control what is and isn't shared with these apps.

It comes after Google simplified Android's app permissions in the summer of 2014, so the latest move represents something of a u-turn.

An official announcement could happen at Google's developer's conference this month, reported Bloomberg, though Google did not comment on the story.

Android has been under pressure to bolster its security, after it was found that millions of devices were vulnerable to attack from malware.

This involved user information being stolen by malicious fake apps downloaded onto smartphones by accident.

Gartner also predicted that Android would soon start to lose more and more of its customers to Apple, with Google already suffering from the iPhone 6 and 6 Plus's popularity, after consumers began to abandon the open-source operating system.

Giving Android users more power over how much information is shared across applications would certainly be a selling point, and may keep customers from jumping ship.

Photo courtesy of opopododo on Flickr

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Iranian hacking group continues to target US citizens
hacking

Iranian hacking group continues to target US citizens

18 Oct 2021
Ennoconn and Google Cloud enter a strategic alliance
Cloud

Ennoconn and Google Cloud enter a strategic alliance

14 Oct 2021
Google Workspace adds Jira and AppSheet integrations
collaboration

Google Workspace adds Jira and AppSheet integrations

13 Oct 2021
Google Cloud reveals edge-focused Distributed Cloud portfolio
cloud computing

Google Cloud reveals edge-focused Distributed Cloud portfolio

13 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021