Google Advanced Protection Program with malicious file analysis

In 2017, Google announced the Advanced Protection Program (APP) for securing the accounts of high-risk individuals such as journalists, business executives, activists, and people involved in electoral processes.

While the service is free to use, subscribers will need to pay a fee to obtain a security key.

In August 2019, Google announced that the Chrome APP would automatically scan for dangerous downloads, turn on alerts if needed, and block downloads of malicious software.
Today the company announced further improvements to this feature.

In one suspension In its blog, Google states that APP clients are already protected from phishing and that Chrome warns when downloading dangerous files. The company seems to be going a step further by allowing APP users to send dangerous files directly to Google to scan for potential threats.

  Firefox 22 Final available for Download

The company will use the cloud-hosting Safe Browsing suite to detect malware to analyze any files uploaded by users to its service.

Google says:

When a user downloads a file, Safe Browsing will perform a quick check using metadata, such as the hashes of the file, to assess if it looks suspicious. Any downloads considered safe by Safe Browsing will show the user a warning and the ability to send the file for scanning. If the user chooses to send the file, Chrome will upload it to Google Safe Browsing, which will scan it using real-time static and dynamic analysis techniques. After a short wait, if Safe Browsing detects that the file is not secure, Chrome will alert the user. As always, users can skip the alert and open the file without scanning if they are sure the file is safe. Safe Browsing deletes files you upload shortly after scanning.

You can find more details about the program here.

Registration in iGuRu.gr via email

Your email for sending each new post

Follow us on Google News iGuRu.gr at Google news

Leave a reply

Your email address Will not be published.

  + 79 = 81

Previous Story

Brutus: Python exploitation framework

Next Story

Can Authorities Use Malware?