For years, mobile phones have ceased to be a simple communication device to become a portable safe: they contain photos, emails, bank access and digital keys. So, when a thief gets done with a smartphone, the damage is not just material; it can open the door to fraud and suplantations. With that reality in mind, Google has presented a new set of Android improvements aimed at complicating the lives of criminals and facilitating the recovery of lost or stolen devices.
The new ones, which expand the protections announced by the company in October 2024, seek to cover three phases: before, during and after the attempt to remove. You can read the official explanation of the Android security team in its latest release on Google's blog Here. and the prior introduction of these defenses in October 2024 Here..

One of the functions that receives more fine controls is what Google calls Failed Authentication Lock: it is an automatic lock that comes into action after a high number of failed attempts to unlock. So far this was a general protection; now users can activate or deactivate it by a specific switch in the settings. In addition, temporary penalties have been tightened after multiple attempts, making it slower and more expensive for a thief to tantar PINS, patterns or passwords. At the same time, the company has introduced mechanisms to avoid accidental blockades - for example, by curiosity or children - ensuring that certain repeated attempts do not have against the limit of reattempts.
Another important improvement extends Identity Check: this mechanism requires biometric authentication when sensitive actions are carried out outside trusted locations. The novelty is that it now automatically protects any function or application using the Android Biometric Prompt standard, including Google's password manager and third-party banking applications. If you want to consult the technical documentation about Biometric Prompt, Google maintains a reference page for developers on evooper.android.com.
For those who lose the phone, Remote Lock - the tool that allows to block a device from any browser - now incorporates the option to order an additional security challenge before running the lock. This measure seeks to prevent a malicious third party from trying to block a device that does not belong to it. The remote locking function is accessible from android.com / lock, and complements other recovery utilities such as Google's well-known Find My Device page.
Google has also decided to test default settings in specific markets: in Brazil, the new devices activated there will come out with two protections aimed at physical theft enabled by default. One detects "snatch-and-run" situations and blocks the device automatically; the other allows remote locking. It is a sign that manufacturers and services can adjust measures according to local risks and usage habits.
In terms of compatibility, recovery tools that facilitate remote location and lock are available for devices with Android 10 or higher. The most advanced authentication protections, on the other hand, require Android 16 or later versions. Therefore, keeping the operating system up to date remains one of the key recommendations for taking advantage of these improvements.

These updates add to other defenses that Google has been deploying: for example, in recent months, scam protection was extended during calls in certain financial applications in the United States. These are steps that, combined, reduce the lines of attack on the phone and the money or data it contains.
If you have an Android and want to take advantage of these improvements, the practical thing is to check the security options in Settings, activate strong blocks (long PIN or password) and biometrics, and make sure that the remote lock function is configured and linked to your account. Equally important is to protect your Google account with two-step verification and review the recovery and blocking policies that accompany your specific phone model.
In short, the new Android defenses seek to turn the theft of a phone into an operation with less chance of success and more cost to the attacker. They are technical improvements that, well used by people, can make the difference between losing a device and avoiding much greater damage. For more details and for official notes, check the Android security team's writing on Google's blog Here. and the Android page on version 16 in evooper.android.com.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...