Tag Archives: safety and security

Five things you can do right now to stay safer online

Editor’s note: Today is Safer Internet Day, but we’ll be talking about it all week with a collection of posts from teams from across Google.


When you’re online, you shouldn’t need to worry about the security of your information. That’s why we work to build security into our products, so the information in your Google account is automatically protected. We also share our best practices and security tools with other organizations, to help make the internet safer for everyone.

Even still, there are some simple things that you can do to make your information even more secure. Recent U.S. data from a survey we conducted with Harris Poll confirms that many people may not be familiar with these basics. 

This Safer Internet Day, take a moment to strengthen your online security by following these five tips:

1. Set up a recovery phone number or email address, and keep it updated.

The majority of people surveyed said they have either a secondary email address (87 percent) or mobile device (73 percent) set for account recovery and security purposes—and that’s great.


For many web services, your Google Account included, having a recovery method can help alert you if there’s suspicious activity on your account or if you need to block someone from using your account without permission. And of course, adding recovery information to your account can help you get back in more quickly if you ever lose access or can't sign in.


To set up recovery information, visit your Google Account’s Security section and scroll down to “Ways we can verify it's you.”


2. Use unique passwords for your accounts.

65 percent of respondents in our poll said they reuse the same password for multiple accounts, which can increase your security risk. It’s like using the same key to lock your home, car and office—if someone gains access to one, all of them could be compromised.  

Create a unique password for each account to eliminate this risk. Make sure that each password is hard to guess and better yet, at least eight characters long. It can be hard to keep track of many different passwords—60 percent of people report having too many passwords to remember. To help, consider using a password manager (like the one built into your Chrome browser) to help you create, safeguard and keep track of all your passwords. If that is too difficult, you can even write your passwords down on a piece of paper (but keep it in a safe place!), since hijackers are most likely to be online, rather than physically near you.


3. Keep your software up to date.

To help protect your online activity, make sure you’re always running the latest version of software on all your devices. The Harris Poll results show that, while 79 percent of respondents said they understood the importance of updating their software, one third of people said they still don’t regularly update their applications, or aren’t sure if they do or not.


If you’re using the below operating systems, here’s where you can look to learn how to check & update the software on your devices:

Some software, like Chrome, will automatically update so you never need to worry about doing it yourself. For other services that send notifications when it’s time to update, don’t click “remind me later”— take the time to install the update right away.


4. Go a step further by setting up two-factor authentication.

Setting up two-factor authentication (2FA)—also known as 2-Step Verification—significantly decreases the chance of someone gaining unauthorized access to your account. For the majority of people, Google’s automatic and risk-based sign-in protections are more than enough, but everyone should know that 2FA is an extra option. However, one in three survey respondents (31 percent) said they do not use 2FA, or don’t know if they are using it or not.


2FA requires you to take a second step each time you sign in to your account on top of your username and password. Examples of second verification steps include: an SMS text message, a six-digit code generated by an app, a prompt that you receive on a trusted device or the use of a physical security key.


Set up two-factor authentication for your Google Account by visiting g.co/2sv and clicking “Get Started.”


5. Take the Google Security Checkup.

The Security Checkup gives you personalized and actionable security recommendations that help you strengthen the security of your Google Account, and it only takes two minutes to complete.

Taking the Security Checkup doesn’t just help make you safer while using Google. The Checkup also includes personalized tips to keep you safer across the web, like helping you set up a screen lock on your mobile phone and advising you to remove risky third-party sites and apps that have access to your account.

Find more online security tips like these by visiting our Safety Center; you can also visit your Google Account’s Security section to find all the settings and tools mentioned in this post. Check out this infographic for more insights from our Online Security Survey.


Teaming up with partners to make the internet safer for kids

Editor’s note: Tomorrow is Safer Internet Day, and we’ll be talking about it all week with a collection of posts from teams around Google.

A year and a half ago, we launched the Be Internet Awesome program to help kids be safe, confident explorers of the online world. We built a little something for everyone: a curriculum for teachers, resources for parents and an adventure-packed online game for kids. And we couldn’t have done it without help from partners like the Family Online Safety Institute (FOSI), National PTA, the David's Legacy Foundation, and Disney’s Wreck It Ralph film “Ralph Breaks the Internet.”

This year’s Safer Internet Day theme is "Together for a better internet." That's something we can really get behind—joining forces with other organizations to help make the internet safer for everyone, especially younger kids. We’re kicking off a week of announcements, starting in San Antonio with the Be Internet Awesome adventure, a bilingual interactive space designed with hands-on activities to help kids and families learn the fundamental lessons of online safety and citizenship.

BIAsa

There are also a bunch of new updates to the Be Internet Awesome program, including:

  • A partnership with the David’s Legacy Foundation to create a program empowering teens to mentor and teach younger kids that it’s cool to be kind online (launching later this year)
  • The launch of Be Internet Awesome in France tomorrow as “Les Super-héros du Net”
  • Teaming up with the Walt Disney Animation Studios film Ralph Breaks the Internet  (recently nominated for an Academy Award©) to encourage more families to practice online safety and digital citizenship with Wreck It Ralph
  • A Be Internet Awesome guide and set of tips designed specifically to help parents foster a conversation with their kids about using the Internet safely

Working with the community to help kids stay safe online

Today in San Antonio, we hosted a panel with our partners to discuss our latest research, conducted with 2,000 parents and 1,000 teachers in the US, to better understand how they view internet safety for kids. We’re sharing the results today—here are a few themes from the panel that stood out:

Cyberbullying is a rising concern in schools

This year, cyberbullying rose to the number one online safety concern for teachers (up from number four last year). Maurine Molak, co-founder of the David’s Legacy foundation, said the first step to reducing cyberbullying is to help kids understand that if you wouldn’t say something in real life, you shouldn’t say it online. Through her work raising awareness and support for anti-cyberbullying legislation, she has observed that teens are often the most influential teachers, because younger kids look up to them.

The online safety conversation needs to start early

Our survey found that parents, on average, said that online safety education should begin when their kids are eight years old. Erin McCowey, who joined us from FOSI, noted that it might be a good idea to start even earlier. While the average kid gets a mobile phone by age eight, the average age for getting a tablet is age six. That’s why FOSI recommends that parents talk to their kids about online safety early and often in their seven steps to good digital parenting.

Teachers and parents need to work together

83 percent of teachers feel they need more resources to teach online safety in the classroom. And in addition to feeling ill-equipped, 87 percent wish parents were more involved when it comes to keeping their kids safe online. Leslie Boggs, President-Elect of National PTA, discussed their PTA Connected program, which encourages conversations about online safety between parents and teachers. As part of that effort, Google and the National PTA partnered earlier this year to facilitate 200 online safety workshops nationwide, providing grants and kits to help parents teach one another about these topics.

A week of online safety goodness

Check in tomorrow as we’ll be sharing a set of security tips that can help you and your whole family stay safer online, and stay tuned throughout the week as we’ll be sharing more about what we do to keep everyone safe online.

Expediting changes to Google+

In October, weannounced that we’d be sunsetting the consumer version of Google+ and its APIs because of the significant challenges involved in maintaining a successful product that meets consumers’ expectations, as well as the platform’s low usage.

We’ve recently determined that some users were impacted by a software update introduced in November that contained a bug affecting a Google+ API. We discovered this bug as part of our standard and ongoing testing procedures and fixed it within a week of it being introduced. No third party compromised our systems, and we have no evidence that the app developers that inadvertently had this access for six days were aware of it or misused it in any way.

With the discovery of this new bug, we have decided to expedite the shut-down of all Google+ APIs; this will occur within the next 90 days. In addition, we have also decided to accelerate the sunsetting of consumer Google+ from August 2019 to April 2019. While we recognize there are implications for developers, we want to ensure the protection of our users.

Details about the bug and our investigation

Our testing revealed that a Google+ API was not operating as intended. We fixed the bug promptly and began an investigation into the issue.

Our investigation into the impact of the bug is ongoing, but here is what we have learned so far:

  • We have confirmed that the bug impacted approximately 52.5 million users in connection with a Google+ API.
  • With respect to this API, apps that requested permission to view profile information that a user had added to their Google+ profile—like their name, email address, occupation, age (full list here)—were granted permission to view profile information about that user even when set to not-public.
  • In addition, apps with access to a user's Google+ profile data also had access to the profile data that had been shared with the consenting user by another Google+ user but that was not shared publicly.
  • The bug did not give developers access to information such as financial data, national identification numbers, passwords, or similar data typically used for fraud or identity theft.
  • No third party compromised our systems, and we have no evidence that the developers who inadvertently had this access for six days were aware of it or misused it in any way.

We have begun the process of notifying consumer users and enterprise customers that were impacted by this bug. Our investigation is ongoing as to any potential impact to other Google+ APIs.

Next steps for Consumer Google+

We will sunset all Google+ APIs in the next 90 days.  Developers can expect to hear more from us on this topic in the coming days, and can stay informed by continuing to check the Google+ developer page.

We have also decided to accelerate sunsetting consumer Google+, bringing it forward from August 2019 to April 2019.  We want to give users ample opportunity to transition off of consumer Google+, and over the coming months, we will continue to provide users with additional information, including ways they can safely and securely download and migrate their data.

A note for our enterprise customers

We are in the process of notifying any enterprise customers that were impacted by this bug. A list of impacted users in those domains is being sent to system administrators, and we will reach out again if any additional impacted users or issues are discovered.

G Suite administrators are always in control of their users’ apps. This ensures that G Suite users can give access only to apps that have been vetted and are trusted by their organization. In addition, we want to reiterate that we will continue to invest in Google+ for enterprise. More details were announced in October.

We understand that our ability to build reliable products that protect your data drives user trust. We have always taken this seriously, and we continue to invest in our privacy programs to refine internal privacy review processes, create powerful data controls, and engage with users, researchers, and policymakers to get their feedback and improve our programs. We will never stop our work to build privacy protections that work for everyone.


Continuing the fight against child sexual abuse online

We can all agree that content that exploits or endangers children is abhorrent and unacceptable. Google has a zero tolerance approach to child sexual abuse material (CSAM) and we are committed to stopping any attempt to use our platforms to spread this kind of abuse.

So this week our experts and engineers are taking part in an industry “hackathon” where technology companies and NGOs are coming together to collaborate and create new ways to tackle child sexual abuse online. This hackathon marks the latest milestone in our effort to fight this issue through technology, teams and partnerships over two decades.

In 2006, we joined the Technology Coalition, partnering with other technology companies on technical solutions to tackle the proliferation of images of child exploitation. Since then, we’ve developed and shared new technologies to help organizations globally root out and stop child abuse material being shared.

In 2008, we began using “hashes,” or unique digital fingerprints, to identify, remove and report copies of known images automatically, without humans having to review them again. In addition to receiving hashes from organizations like the Internet Watch Foundationand the National Center for Missing and Exploited Children, we also add hashes of newly discovered content to a shared industry database so that other organizations can collaborate on detecting and removing these images.

In 2013, we made changes to the Google Search algorithm to further prevent images, videos and links to child abuse material from appearing in our search results. We’ve implemented this change around the world in 40 languages. We’ve launched deterrence campaigns, including a partnership with the Lucy Faithfull Foundation in the UK, to show warning messages in response to search terms associated with child sexual abuse terms. As a result of these efforts, we’ve seen a thirteen-fold reduction in the number of child sexual abuse image-related queries in Google Search.

In 2015, we expanded our work on hashes by introducing first-of-its-kind fingerprinting and matching technology for videos on YouTube, to scan and identify uploaded videos that contain known child sexual abuse material. This technology, CSAI Match, is unique in its resistance to manipulation and obfuscation of content, and it dramatically increases the number of violative videos that can be detected compared to previous methods. As with many of the new technologies we develop to tackle this kind of harm, we shared this technology with industry free of charge.  

This work has been effective in stopping the spread of known CSAM content online over the years. In 2018, we announced new AI technology which steps up the fight against abusers by identifying potential new CSAM content for the first time. Our new image classifierassists human reviewers sorting through images by prioritizing the most likely CSAM content for review. It already enables us to find and report almost 100 percent more CSAM than was possible using hash matching alone, and helps reviewers to find CSAM content seven times faster.

Since we made the new technology available for free via our Content Safety API in September, more than 200 organizations have requested to access it to support their work to protect children. Identifying and removing new images more quickly—often before they have even been viewed—means children who are being sexually abused today are more likely to be identified and protected from further abuse. It also reduces the toll on reviewers by requiring fewer people to be exposed to CSAM content.

Because this kind of abuse can manifest through text as well as images, we recently made substantial changes to tackle predatory behavior in YouTube comments using a classifier, which surfaces for review inappropriate sexual or predatory comments on videos featuring minors. This has led to a significant reduction in violative comments this year.

Underpinning all of this work is a deep collaboration with partners. As well as the Technology Coalition, we’re members of the Internet Watch Foundation and the WePROTECT Global Alliance, and we report any CSAM content we find to the National Center for Missing and Exploited Children who in turn report to law enforcement.

Technology, and the methods used by those who seek to exploit it, are constantly evolving and there will always be more to do to tackle this heinous crime. We are crystal clear about our responsibility to ensure our products and services offer safe experiences, and we are fully committed to protecting children from sexual exploitation.

Making it easier to control your data, directly in Google products

We’re always working on making it easier for you to understand and control your data so you can make privacy choices that are right for you. Earlier this year, we launched a new Google Account experience that puts your privacy and security front and center, and we updated our Privacy Policy with videos and clearer language to better describe the information we collect, why we collect it, and how you can control it.


Today, we’re making it easier for you to make decisions about your data directly within the Google products you use every day, starting with Search. Without ever leaving Search, you can now review and delete your recent Search activity, get quick access to the most relevant privacy controls in your Google Account, and learn more about how Search works with your data.

Control your data, directly in the Google products

Control your data, directly in the Google products you use every day


When you use Google products, you generate data about your activity. For Search, this data includes the terms you search for, links you interact with and other information like your current location when you search.

Before today, if you were searching on Google and wanted to review or manage this data, the best way for you to do that would have been to visit your Google Account. Now, we’re bringing these controls to you – from directly within Search, you can review or delete your Search activity and quickly get back to finding what you were searching for.     

We’re also providing quick access to the privacy controls in your Google Account that are most relevant as you use Search. For example, to control the ads you see when you search, we give you access to your Ad Settings. Additionally, you can access your Activity Controls to decide what information Google saves to your account and uses to make Search and other Google services faster, smarter and more useful.

Your data in search

If you want to learn more about what data is being generated as you use Google services and how we use data to improve your experience, you can now find a short video that helps explain this information.

Google Privacy Advisor

We’re launching this improvement in Google Search on desktop and mobile web today, and in the Google app for iOS and Android in the coming weeks. Next year, we’ll expand this to Maps, followed by many other Google products. Having access to relevant and actionable privacy controls directly from the Google products you use every day is just one way that we are continuously working to build privacy that works for everyone. 

Source: Search


Titan M makes Pixel 3 our most secure phone yet


Security has always been a top priority for Pixel, spanning both the hardware and software of our devices. This includes monthly security updates and yearly OS updates, so Pixel always has the most secure version of Android, as well as Google Play Protect to help safeguard your phone from malware. Last year on Pixel 2, we also included a dedicated tamper-resistant hardware security module to protect your lock screen and strengthen disk encryption.

This year, with Pixel 3, we’re advancing our investment in secure hardware with Titan M, an enterprise-grade security chip custom built for Pixel 3 to secure your most sensitive on-device data and operating system. With Titan M, we took the best features from the Titan chip used in Google Cloud data centers and tailored it for mobile.



Here are a few ways Titan M protects your phone.

Security in the Bootloader

First, to protect Android from outside tampering, we’ve integrated Titan M into Verified Boot, our secure boot process.

Titan M helps the bootloader—the program that validates and loads Android when the phone turns on—make sure that you’re running the right version of Android. Specifically, Titan M stores the last known safe Android version and prevents “bad actors” from moving your device back to run on an older, potentially vulnerable, version of Android behind your back. Titan M also prevents attackers running in Android attempting to unlock the bootloader.

Lock Screen Protection & Disk Encryption On-Device

Pixel 3 also uses Titan M to verify your lock screen passcode. It makes the process of guessing multiple  password combinations harder by limiting the amount of logon attempts, making it difficult for bad actors to unlock your phone. Only upon successful verification of your passcode will Titan M allow for decryption.

In addition, the secure flash and fully independent computation of Titan M makes it harder for an attacker to tamper with this process to gain the secrets to decrypt your data.

Secure Transactions in Third-Party Apps

Third, Titan M is used not only to protect Android and its functionality, but also to protect third-party apps and secure sensitive transactions. With Android 9, apps can now take advantage of StrongBox KeyStore APIs to generate and store their private keys in Titan M. The Google Pay team is actively testing out these new APIs to secure transactions.

For apps that rely on user interaction to confirm a transaction, Titan M also enables Android 9 Protected Confirmation, an API for protecting the most security-critical operations. As more processes come online and go mobile—like e-voting, and P2P money transfers—these APIs can help to ensure that the user (not malware) has confirmed the transaction. Pixel 3 is the first device to ship with this protection.

Insider Attack Resistance

Last, but not least, to prevent tampering, Titan M is built with insider attack resistance. The firmware on Titan M will never be updated unless you have entered your passcode, meaning bad actors cannot bypass your lock screen to update the firmware to a malicious version.

With the Pixel 3, we’ve increased our investment in security and put industry-leading hardware features into the device, so you can rest assured that your security and privacy are well protected. In the coming months, the security community will be able to audit Titan through its open-source firmware. In the meantime, you can test out Titan M and all of the smarts Pixel 3 brings, when it goes on sale on Thursday, October 18 in the U.S.

Project Strobe: Protecting your data, improving our third-party APIs, and sunsetting consumer Google+

Many third-party apps, services and websites build on top of our various services to improve everyone’s phones, working life, and online experience. We strongly support this active ecosystem. But increasingly, its success depends on users knowing that their data is secure, and on developers having clear rules of the road.

Over the years we’ve continually strengthened our controls and policies in response to regular internal reviews, user feedback and evolving expectations about data privacy and security.

At the beginning of this year, we started an effort called Project Strobe—a root-and-branch review of third-party developer access to Google account and Android device data and of our philosophy around apps’ data access. This project looked at the operation of our privacy controls, platforms where users were not engaging with our APIs because of concerns around data privacy, areas where developers may have been granted overly broad access, and other areas in which our policies should be tightened.  

We’re announcing the first four findings and actions from this review today.

Finding 1: There are significant challenges in creating and maintaining a successful Google+ product that meets consumers’ expectations.

Action 1: We are shutting down Google+ for consumers.

Over the years we’ve received feedback that people want to better understand how to control the data they choose to share with apps on Google+. So as part of Project Strobe, one of our first priorities was to closely review all the APIs associated with Google+.  

This review crystallized what we’ve known for a while: that while our engineering teams have put a lot of effort and dedication into building Google+ over the years, it has not achieved broad consumer or developer adoption, and has seen limited user interaction with apps. The consumer version of Google+ currently has low usage and engagement: 90 percent of Google+ user sessions are less than five seconds.

Our review showed that our Google+ APIs, and the associated controls for consumers, are challenging to develop and maintain. Underlining this, as part of our Project Strobe audit, we discovered a bug in one of the Google+ People APIs:

  • Users can grant access to their Profile data, and the public Profile information of their friends, to Google+ apps, via the API.

  • The bug meant that apps also had access to Profile fields that were shared with the user, but not marked as public.  

  • This data is limited to static, optional Google+ Profile fields including name, email address, occupation, gender and age. (See the full list on our developer site.) It does not include any other data you may have posted or connected to Google+ or any other service, like Google+ posts, messages, Google account data, phone numbers or G Suite content.

  • We discovered and immediately patched this bug in March 2018. We believe it occurred after launch as a result of the API’s interaction with a subsequent Google+ code change.

  • We made Google+ with privacy in mind and therefore keep this API’s log data for only two weeks. That means we cannot confirm which users were impacted by this bug. However, we ran a detailed analysis over the two weeks prior to patching the bug, and from that analysis, the Profiles of up to 500,000 Google+ accounts were potentially affected. Our analysis showed that up to 438 applications may have used this API.

  • We found no evidence that any developer was aware of this bug, or abusing the API, and we found no evidence that any Profile data was misused.

Every year, we send millions of notifications to users about privacy and security bugs and issues. Whenever user data may have been affected, we go beyond our legal requirements and apply several criteria focused on our users in determining whether to provide notice.

Our Privacy & Data Protection Office reviewed this issue, looking at the type of data involved, whether we could accurately identify the users to inform, whether there was any evidence of misuse, and whether there were any actions a developer or user could take in response. None of these thresholds were met in this instance.

The review did highlight the significant challenges in creating and maintaining a successful Google+ that meets consumers’ expectations. Given these challenges and the very low usage of the consumer version of Google+, we decided to sunset the consumer version of Google+.

To give people a full opportunity to transition, we will implement this wind-down over a 10-month period, slated for completion by the end of next August. Over the coming months, we will provide consumers with additional information, including ways they can download and migrate their data.

At the same time, we have many enterprise customers who are finding great value in using Google+ within their companies. Our review showed that Google+ is better suited as an enterprise product where co-workers can engage in internal discussions on a secure corporate social network. Enterprise customers can set common access rules, and use central controls, for their entire organization. We’ve decided to focus on our enterprise efforts and will be launching new features purpose-built for businesses. We will share more information in the coming days.  

Finding 2: People want fine-grained controls over the data they share with apps.

Action 2: We are launching more granular Google Account permissions that will show in individual dialog boxes.

When an app prompts you for access to your Google account data, we always require that you see what data it has asked for, and you must grant it explicit permission.

Going forward, consumers will get more fine-grained control over what account data they choose to share with each app. Instead of seeing all requested permissions in a single screen, apps will have to show you each requested permission, one at a time, within its own dialog box.  For example, if a developer requests access to both calendar entries and Drive documents, you will be able to choose to share one but not the other. Developers can read more on the Google Developer Blog.

This is what the process looks like today when an app requests access to any data in your consumer Google account (you've always been able to choose whether to grant that permission request):

bundled-calendar-drive.png

This is what it will look like:

unbundled-calendar-drive-taps.png

Finding 3: When users grant apps access to their Gmail, they do so with certain use cases in mind.   

Action 3: We are limiting the types of use cases that are permitted.

We are updating our User Data Policy for the consumer Gmail API to limit the apps that may seek permission to access your consumer Gmail data. Only apps directly enhancing email functionality—such as email clients, email backup services and productivity services (e.g., CRM and mail merge services)—will be authorized to access this data. Moreover, these apps will need to agree to new rules on handling Gmail data and will be subject to security assessments. Developers can read more details on the Gmail Developer Blog. (As always, G Suite administrators are in control of their users’ apps.)

You can always review and control which apps have access to your Google account data (including Gmail) within our Security Checkup tool.

Finding 4: When users grant SMS, Contacts and Phone permissions to Android apps, they do so with certain use cases in mind.   

Action 4: We are limiting apps’ ability to receive Call Log and SMS permissions on Android devices, and are no longer making contact interaction data available via the Android Contacts API.

Some Android apps ask for permission to access a user’s phone (including call logs) and SMS data. Going forward, Google Play will limit which apps are allowed to ask for these permissions.  Only an app that you’ve selected as your default app for making calls or text messages will be able to make these requests. (There are some exceptions—e.g., voicemail and backup apps.) Developers can find more details in the Google Play Developer Policy Center and in the Help Center.

Additionally, as part of the Android Contacts permission, we had provided basic interaction data  so, for example, a messaging app could show you your most recent contacts. We will remove access to contact interaction data from the Android Contacts API within the next few months.


In the coming months, we’ll roll out additional controls and updating policies across more of our APIs. As we do so, we’ll work with our developer partners to give them appropriate time to adjust and update their apps and services.

Our goal is to support a wide range of useful apps, while ensuring that everyone is confident that their data is secure. By giving developers more explicit rules of the road, and helping users control your data, we can ensure that we keep doing just that.

The new Google Safety Centre comes to Europe: Helping you stay safe online

Starting today, we’re rolling out our newly expanded Safety Centre in six countries across Europe (Belgium, France, Germany, Italy, the Netherlands and the U.K.). You'll now be able to find even more tools, easy tips, and information about data security, privacy controls and how to use technology in a way that is right for your family, just in time for European Cyber Security Month. More countries and languages will be available in the coming weeks.

Helping people manage their privacy and security is integral to everything we do. Over the years we’ve created many tools and are always improving them so you’re in control: Google Account gives you access to all the settings to safeguard your data and privacy; Privacy Checkup helps you quickly review and adjust what data Google uses to personalize your experience; and My Activity helps you review the activity data connected to your account.

safety center - europe

Parents can also find information in the Safety Centre about how to use tools like Family Link and YouTube Kids to set digital ground rules, and get tips on how to talk with their children and teens about being considerate, setting boundaries, and staying safe online. You can also find links and advice on important issues like cyberbullying, screen time and oversharing from child online safety experts from organizations like FSM and fragFINN in Germany, e-Enfance and Génération Numérique in France, Parent Zone and Internet Matters in the United Kingdom, and Expertisebureau Online Kindermisbruik in the Netherlands.

The Google Safety Centre is part of our ongoing commitment to give you tools and information to control how your data is used in Google services. As technology keeps changing the way we live and work, you can expect our tools to continually evolve to fit your needs.

Optimistic dissatisfaction with the status quo of security

This article is a condensed version of a keynote speech Parisa gave at Black Hat Conferenceon July 8, 2018.

As I kid, I used to spend hours at the arcade playing whack-a-mole. With a toy mallet in hand, I’d smash as many plastic moles as possible. But the more moles I whacked, the faster they popped up out of their holes.

I haven’t played this arcade game in years, but there have been times when my career in computer security felt like a reality version of whack-a-mole. Computer security issues are emerging at a quickening pace, and everyone’s energy is spent knocking out the same problems over and over and over.

We have to stop taking a whack-a-mole approach to security. Instead, we need to focus our energy on tackling the root causes of bad security, strategically investing in long-arc defense projects, and building out our coalitions beyond security experts.

Tackle the root cause

As the world becomes more dependent on safe and reliable technology, we can no longer be satisfied with isolated security fixes. Instead, we need to identify and tackle the underlying causes of bad security—whether they’re structural, organizational or technical.

Project Zero, a team that formed at Google in 2014, aims to advance the understanding of offensive security and improve defensive strategies. Over the past four years, the team has reported more than 1,400 vulnerabilities in a variety of targets, including operating systems, browsers, antivirus software, password managers, hardware and other popular software. But what's more impressive than that number is the impact we’re seeing across industry in terms of tackling the root causes of bad security.

In the case of Project Zero, the team recognized that vendor response times for fixing critical security reports varied hugely, and it often didn’t tip in favor of the people using the technology. Unfortunately, software vendors don’t always have incentives aligned that prioritize security. To address that underlying problem, Project Zero introduced a consistent 90-day disclosure policy that removed the historical, time-consuming negotiation between security researchers and vendors.

Initially, this deadline-driven approach was controversial. It caused short-term pain for organizations that needed to make structural changes. But sticking to this approach resulted in  vendors investing more in solving root problems that, for whatever reason, weren’t previously addressed. Since the introduction of the deadline-driven disclosure policy, one large vendor doubled the number of security updates released each year, and another vendor improved response time by 40 percent. When it came to the controversial deadline, 98 percent of the security issues Project Zero reported have been fixed within 90 days, up from 25 percent.

Through all of this, Project Zero worked in the open to advance the public’s understanding of exploitation techniques. Ultimately, the team recognized that one individual security researcher isn’t likely to change the behavior of a large vendor, but a larger public response can. The team sought out opportunities for collaboration with other vendors, and people came together, both inside and outside the walls of Google, to analyze and build defenses against exploits discovered in the wild.

Solving the root problems—especially in today’s distraction-driven environments—isn’t always the fastest or easiest route to take, but it builds a foundation for a more secure future.

Celebrate milestones to make progress on strategic projects

To make real security change, we need to commit to long-arc defense efforts, no matter how complex they may be or how long they take to complete. Maintaining momentum for these projects requires strategically picking milestones, communicating them repeatedly and celebrating progress along the way.

In 2014, the Chrome team set out on a mission to drive the adoption of HTTPS on the open web. We wanted the web to be secure by default, instead of opt-in secure. We also wanted to address confusion in our existing network security indicators; users weren’t perceiving the risk of HTTP connections given our lack of a warning. We knew this project would take many years to complete because of the complexity of the web ecosystem and the associated risk of making big changes to browser security warnings.

It's important to remember that nobody owns the web. It’s an open ecosystem of multiple players, each with different incentives and constraints—so projects of this magnitude require wrangling a lot of moving parts. To avoid creating warning fatigue and confusion about the web, we set strategic milestones over a long period and share them publicly.

My job as a manager was to make sure my team believed change was possible and that they stayed optimistic over the entire course of the project. We shared a comprehensive step-by-step strategy and published the plan on our developer wiki for feedback. Our milestone-based plan started out simple and increasingly upped the pressure over time. Internally, we found fun and inexpensive ways to keep team morale high. We kicked off a brainstorming day with a poetry slam—finger snapping included! We made celebratory HTTPS cakes, pies and cookies. We also had a team chat to share updates, challenges and a lot of GIFs.

https cake

Building momentum externally was equally important. When sites made the switch to the more secure HTTPS, we celebrated with the broader community—usually via Twitter. And we published a transparency report that shed light on top sites and their HTTPS status. Hooray for openness!

Since our official announcement of these changes, HTTPS usage has made incredible progress. The web is ultimately more secure today because of a loose coalition of people who were able to stay committed to seeing a long, ambitious project all the way through. Which brings me to my third point...

Build a coalition

As we proactively invest in ambitious defense projects where the benefits aren’t immediately clear, we need to build a strong coalition of champions and supporters.

In 2012, the Chrome team started its Site Isolation effort, a project that mitigated the risk of cross-site data theft on the web. The project turned out to be the largest architecture change and code refactor in the history of Chrome! This was no small task considering Chrome is 10 years old, has more than 10 million lines of C++ code and has hundreds of engineers committing hundreds of changes each day from around the world. The core Site Isolation team was made up of only around 10 people, so building a strong coalition of support for the project outside of the team was critical for its success.

Originally, we thought this project would take a year to complete. Turns out we were off by more than a factor of five! Estimation mistakes like this tend to put a bullseye on a project’s back from upper management—and with good reason. Luckily, the team regularly articulated progress to me and the reasons why it was more work than first anticipated. They also demonstrated positive impact in terms of overall Chrome code health, which benefited other parts of Chrome. That gave me additional cover to defend the project and communicate its value to senior stakeholders over the years.

Aside from management, the team needed allies from partner teams. If other Chrome team members weren’t motivated to help or didn’t respond quickly to questions, emails and code reviews, then this 10-person project could have dragged on forever. The team kept a positive attitude and went out of their way to help others, even if it didn't relate directly to their own project. Ultimately, they conducted themselves as good citizens to build a community of support—a good lesson for all of us. We might be able to find the problems and technical solutions on our own, but we rely on everyone working on technology to help clear the path to a safer future.

We’ll keep finding complex problems to solve as technology evolves, but I’m optimistic that we can continue to keep people safe. It just requires a little bit of change. We need to take a different approach to computer security that doesn’t feel like playing whack-o-mole. So let’s band together—inside and outside of our organizations—and commit to ambitious projects that solve the root problems. And let’s not forget to celebrate our wins along the way! ?

Source: Google Chrome


Work reimagined: new ways to collaborate safer, smarter and simpler with G Suite

Over the last decade we’ve witnessed the maturation of G Suite—from the introduction of Gmail and Google Docs to more recent advancements in AI and machine learning that are powering, and protecting, the world's email. Now, more than 4 million paying businesses are using our suite to reimagine how they work, and companies like Whirlpool, Nielsen, BBVA and Broadcom are among the many who choose G Suite to move faster, better connect their teams and advance their competitive edge.

In the past year, our team has worked hard to offer nearly 300 new capabilities for G Suite users. Today, we’re excited to share some of the new ways organizations can use G Suite to focus on creative work and move their business forward—keep an eye out for additional announcements to come tomorrow as well.

Here’s what we’re announcing today:

  • Security center investigation tool (available in an Early Adopter Program* for G Suite Enterprise customers)

  • Data regions (available now for G Suite Business and Enterprise customers)

  • Smart Reply in Hangouts Chat (coming soon to G Suite customers)

  • Smart Compose (coming soon to G Suite customers)

  • Grammar Suggestions in Google Docs (available in an Early Adopter Program for G Suite customers today)

  • Voice commands in Hangouts Meet hardware (coming to select Hangouts Meet hardware customers later this year)

Nothing matters more than security

Businesses need a way to simplify their security management, which is why earlier this year we introduced the security center for G Suite. The security center brings together security analytics, actionable insights and best practice recommendations from Google to help you protect your organization, data and users.

Today, we’re announcing our new investigation tool in security center, which adds integrated remediation to the prevention and detection capabilities of the security center. Admins can identify which users are potentially infected, see if anything’s been shared externally and remove access to Drive files or delete malicious emails. Since the investigation tool makes it possible to review your data security in one place and has a simple UI, it makes it easier to take action against threats without having to worry about analyzing logs which can be time-consuming and require complex scripting. Investigation tool is available today as part of our Early Adopter Program (EAP) for G Suite Enterprise customers. Learn more.

Investigation Tool in Security Center - G Suite Next '18

In addition to giving admins a simpler way to keep data secure, we’re constantly working to ensure that they have the transparency and control they need. That’s why we’re adding support for data regions to G Suite. For organizations with data control requirements, G Suite will now let customers choose where to store primary data for select G Suite apps—globally distributed, U.S. or Europe. We’re also making it simple to manage your data regions on an ongoing basis. For example, when a file’s owner changes or moves to another organizational unit, we automatically move the data—with no impact on the file’s availability to collaborators. Plus, users continue to get full edit rights on content while data is being moved.

Data Regions - G Suite Next '18

Rob Tollerton, Director of IT at PricewaterhouseCoopers International Limited (PwCIL), and his team are using G Suite to manage global data policies: "Given PwC is a global network with operations in 158 countries, I am very happy to see Google investing in data regions for G Suite and thrilled by how easy and intuitive it will be to set up and manage multi-region policies for our domain.“

Data regions for G Suite is generally available to all G Suite Business and Enterprise customers today at no additional cost. We're continually investing in the offering and will expand it further over time. Learn more.

I am very happy to see Google investing in data regions for G Suite and thrilled by how easy it will be to set up and manage multi-region policies. Rob Tollerton
Director of IT, PwCIL

Let machines do the mundane work

We’ve spent many years as a company investing in AI and machine learning, and we’re dedicated to a simple idea: rather than replacing human skills, we think AI has endless potential to enhance them. Google AI is already helping millions of people around the world navigate, communicate and get things done in our consumer products. In G Suite, we’re using AI to help businesses and their employees do their best work.

Many of you use Smart Reply in Gmail. It processes hundreds of millions of messages daily and already drives more than 10 percent of email replies. Today we’re announcing that Smart Reply is coming to Hangouts Chat to help you respond to messages quicker so you can free up time to focus on creative work.

Our technology recognizes which messages most likely need responses, and proposes three different replies that sound like how you typically respond. The proposed responses are casual enough for chat and yet appropriate in a workplace. Smart Reply in Hangouts Chat will be available to G Suite customers in the coming weeks.

Smart Reply in Hangouts Chat - G Suite Next '18

Smart Reply makes sending short replies easy, especially on the go. But we know that the most time-consuming emails require longer, more complex thoughts. That’s why we built Smart Compose, which you may have heard Sundar talk about at Google I/O this year. Smart Compose intelligently autocompletes your emails; it can fill in greetings, sign offs and common phrases so you can collaborate efficiently. We first launched Smart Compose to consumers in May, and now Smart Compose in Gmail is ready for G Suite customers.

In addition to autocompleting common phrases, Smart Compose can insert personalized information like your office or home address, so you don’t need to spend time in repetitive tasks. And best of all, it will get smarter with time—for example, learning how you prefer to greet certain people in emails to ensure that when you use Smart Compose you sound like yourself.

Smart Compose in Gmail will be available to G Suite customers in the coming weeks.

Smart Compose - G Suite Next '18

We’re also using AI to help people write more clearly and effectively. It can be tricky at times to catch things like spelling and grammatical errors that inadvertently change the meaning of a sentence. That’s why we’re introducing grammar suggestions in Docs. To solve grammar corrections, we use a unique machine translation-based approach to recognize errors and suggest corrections on the fly. Our AI can catch several different types of corrections, from simple grammatical rules like how to use articles in a sentence (like “a” versus “an”), to more complicated grammatical concepts such as how to use subordinate clauses correctly. Machine learning will help improve this capability over time to detect trickier grammar issues. And because it’s built natively in Docs, it’s highly secure and reliable. Grammar suggestions in Docs is available today in our Early Adopter Program.

Grammar in Docs - G Suite Next '18

Beyond writing, we’re also working to improve meetings. Last fall, G Suite launched Hangouts Meet hardware, enabling organizations to have reliable, effective video meetings at scale. Many people still view connecting to video meetings as daunting, which is why we’re using Google AI to create a more inviting experience.

We're excited to see so many people actively engaged with Google Assistant through voice—managing their smart home and entertainment—and today, we’re bringing some of that same magic to conference rooms with voice commands for Hangouts Meet hardwareso that teams can connect to a video meeting in seconds. We plan to roll this out to select Meet hardware customers later this year.

Simplify work with G Suite

One of the reasons why G Suite is able to deliver real transformation to businesses is that it’s simple to use and adopt. G Suite was born in the cloud and built for the cloud, which means real-time collaboration is effortless. This is why more than a billion people rely on G Suite apps like Gmail, Docs, Drive and more in their personal lives. Instead of defaulting to old habits—like saving content on your desktop—G Suite saves your work securely in the cloud and provides a means for teams to push the boundaries of what they create.

In fact, 74 percent of all time spent in Docs, Sheets and Slides is on collaborative work—that is, multiple people creating and editing content together. This is a stark difference from what businesses see with legacy tools, where the work is often done individually on a desktop client.

So that’s how we’re reimagining work. Learn more about these announcements by visiting the G Suite website—or stay tuned for more updates in G Suite tomorrow.


*The G Suite Trusted Tester and Early Adopter Programs will soon be renamed as Alpha and Beta, respectively. More details to come.

Source: Gmail Blog