Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Google Launches Android Spyware Forensics Tool for High-Risk Users

May 14, 2026

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

May 14, 2026

Most Organizations Use AI Agents for Sensitive Security Tasks

May 14, 2026
Facebook X (Twitter) Instagram
Thursday, May 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Google Launches Android Spyware Forensics Tool for High-Risk Users
News

Google Launches Android Spyware Forensics Tool for High-Risk Users

Team-CWDBy Team-CWDMay 14, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Google is rolling out a new feature that will help investigate spyware attacks on Android devices.

The new tool, called Android Intrusion Logging, was released on May 12 as part of Google’s Android Advanced Protection Mode (AAPM).

This mode, which can be likened to Apple’s Lockdown Mode, was launched in 2025. Designed to enhance the security of Android devices for at-risk users, AAPM packages a set of pre-determined features designed to bolster device protection against scams, fraud and targeted attacks.

AAPM’s newest feature, Intrusion Logging, was developed by Google in partnership with civil society organizations, including Amnesty International’s ’s Security Lab and Reporters Without Borders’ Digital Security Lab.

With Intrusion Logging, high-risk Android users can log their device and network activities for times when they notice suspicious activity or suspect their device has been infected with malware.

By doing that, they will allow trusted security experts to perform forensic investigations into their device’s behavior, including applications that run on it.

These logs include:

  • Security events (e.g. device unlocking, physical access and abusive interactions)
  • Spyware installation and removal
  • Domain name system (DNS) and connections events

All forensic logs, collected once a day by default, are encrypted with a user-generated key before the logs are securely archived in the user’s Google account. The logs can later be accessed and decrypted by the user, but not by Google or any unauthorized third parties.

When forensic analysis is required, the device owner must explicitly share these logs from the device itself in a secure manner with the forensic analyst.

“Intrusion Logging logs may include sensitive information such as browser navigation history. Secure sharing of logs and informed consent are therefore more essential than ever,” warned Amnesty International in a May 12 report.

Donncha Ó Cearbhaill, head of security at Amnesty Tech, praised Google for the release of Intrusion Logging on X. He explained that spyware forensic work “has so far relied on incidental logs that were never designed for security analysis and are too often partial and short-lived.”

“Now we have the possibility to detect advanced spyware, exploits, unauthorized physical access, even months after the fact,” he added.

The feature is opt-in for Pixel devices on Android 16 and later versions with Advanced Protection mode enabled. Users who wish to benefit from Intrusion Logging must have a Google account linked to their device.

Google plans to roll Intrusion Logging out beyond Pixel devices in the future.

In parallel to the introduction of Intrusion Logging, Amnesty International has releasing updates to Android Quick Forensics (AndroidQF).

AndroidQF is a lightweight open source forensic tool for Android devices to quickly extract and analyze critical evidence during investigations, and the Mobile Verification Toolkit (MVT), an Amnesty-made, open source toolkit to simplify and automate the process of gathering forensic traces to identify a potential compromise of Android and iOS devices.

Latest Updates to Android Advanced Protection Mode

Google also has rolled out a package of updates to its Android Advanced Protection Mode. These include:

  • USB Protection: Now available on all Pixel devices running Android 16 and newer, this feature blocks new USB data connections while the device screen is locked
  • Restricted accessibility services: Starting with Android 17, the mode will remove accessibility service access for all apps that are not explicitly labeled as accessibility tools to prevent malicious exploitation
  • Disabled device-to-device unlocking: To enhance physical security, the ability to unlock one device using another nearby trusted device is being disabled
  • Chrome WebGPU support removal: Support for WebGPU in Chrome will be disabled within this mode to reduce the browser’s attack surface
  • Chat notification scam detection: The mode will now integrate scam detection specifically for chat notifications to help identify and block fraudulent messages.

Finally, Advanced Protection will be expanded to support managed devices through Android Enterprise later this year.

Image credits: Thrive Studios ID / DIA TV / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePalo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
Team-CWD
  • Website

Related Posts

News

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

May 14, 2026
News

Most Organizations Use AI Agents for Sensitive Security Tasks

May 14, 2026
News

Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

Children and chatbots: What parents should know

January 23, 2026

A quick guide to recovering a hacked account

March 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.