A New Front Line Against Phone-Based Financial Scams
Google is making a major push to curb financial fraud with a fresh wave of Android security upgrades announced at the Android Show I/O Edition. The focus this time is squarely on real-world money loss: phone-based scams, malicious apps, and sneaky malware behaviors that traditional tools often miss. These Android security upgrades are designed to turn your phone into a more active defender, especially against social engineering attacks that trick users into handing over sensitive data or authorizing transactions. Instead of only scanning for known malware, Google is increasingly tying security to identity verification and real-time behavior monitoring. The goal is to make Android scam blocking more proactive, so that dangerous behavior is detected and stopped as it happens, reducing reliance on users to spot every red flag on their own.

How Verified Financial Calls Auto-Block Spoofed Bank Numbers
The headline feature is verified financial calls, a new spoofed calls feature that automatically ends suspicious calls claiming to be from your bank or financial institution. Phone spoofing, where scammers fake caller IDs using internet-based systems, is estimated to cost users USD 950 million (approx. RM4.37 billion) annually worldwide. With verified financial calls, Android checks in real time with your bank’s app—if you have a participating app installed and are signed in—to confirm whether the institution is actually calling you. If the app says it is not, Android will auto-hang up before you even speak. This verified financial calls capability will roll out to devices running Android 11 and later, initially supporting partners like Revolut, Itaú, and Nubank, with more institutions expected to come on board later.

Beyond Calls: Live Threat Detection and Dynamic Monitoring
Verified calls are just one piece of Google’s broader Android scam blocking strategy. Live Threat Detection, an on-device AI system, is expanding to catch apps that secretly forward SMS messages or abuse accessibility permissions to overlay hidden content on your screen. This directly targets malware that hijacks one-time passwords or hides malicious UI elements. A new dynamic signal monitoring capability will further enhance protection, watching for apps that change or hide their icons before launching in the background—classic malware behavior. Crucially, this system lets Google push updated threat rules as new attack patterns appear, without waiting for full OS updates. Dynamic signal monitoring is slated to arrive with Android 17 on select devices, reflecting a move toward continuous, adaptive defense rather than one-off security scans.
Protecting One-Time Passwords and Downloads from Abuse
Recognizing that scammers increasingly chase two-factor authentication codes, Google is also tightening control around one-time passwords. Android will automatically hide OTPs from most apps for three hours after arrival, limiting the window in which malicious software with SMS access can intercept them. This change strikes at a common fraud tactic where compromised apps silently read authentication messages to break into banking or payment accounts. On the web side, Chrome on Android is gaining the ability to scan APK files for known malware before a download completes, provided Safe Browsing is enabled. Together, these Android security upgrades make it harder for attackers to abuse both messaging and sideloaded apps, nudging the platform toward safer defaults without demanding constant vigilance from users.
Why Stronger Native Security Matters for Everyday Users
Real-world experiences highlight why these changes are necessary. As documented by Android Authority, even Google Play Protect can miss apps that behave like adware or unwanted launchers, flooding devices with aggressive ads and quietly obtaining broad permissions. Less tech-savvy users often install such apps after tapping deceptive ads or fake update prompts, then struggle to identify what went wrong. Because the offending apps may not trigger traditional malware signatures, they can slip through automated checks. Google’s new approach—verifying who is actually calling, monitoring live behavior, and restricting access to sensitive elements like OTPs—directly addresses these gaps. By building smarter, more context-aware protections into the operating system itself, Android moves closer to an environment where users are safeguarded even when they tap the wrong link or trust the wrong caller ID.
