Google APVI finds errors in OEMs code

The ασφάλειας της Google επεκτείνουν το εύρος των εργασιών τους αφού θα διερευνούν in the software available at OEM Appliances such as from Huawei, ZTE and Samsung.

Image by xda-developers.com

The new program is called Android Partner Vulnerability Initiative (APVI by Android Partner Vulnerability Initiative). Through the new program, Google's Android security and privacy team will be able to investigate and reveal defects in OEM software.

"APVI covers issues discovered by Google that could potentially affect the security of an Android device or its user. The new service is in line with the standard ISO / IEC 29147: 2018 Information technology - Security techniques - Vulnerability disclosure recommendations", Says Google.

The team has already revealed and reported a number of vulnerabilities in OEMs, some of which have not been fixed.

The program works like the Gap Rewards Program of Android (ASR from Android Rewards Program ) και το Πρόγραμμα ανταμοιβών ασφαλείας του , which contributes to the Android Security Bulletins (ASB), which ultimately leads to the monthly Security Patch Level (SPL) for Android.

You can track the latest known vulnerabilities in the debugger through it Chromium bug tracker.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).