Connect with us

Technology

Android feature prevents sensitive content in Google Messages

Published

on

Android feature prevents sensitive content in Google Messages

Have you ever stumbled upon a mysterious app in your Android system settings called “SafetyCore”? If so, you’re not alone. Introduced in late 2024, this system service aims to enhance on-device privacy by detecting sensitive content like nudity and enabling features such as Sensitive Content Warnings in Google Messages. 

While Google assures users that SafetyCore operates locally without sharing data externally, it has still sparked confusion over automatic updates. Let’s dive into what SafetyCore does, how it works and the steps you can take to disable it if you choose to do so.

Stay protected & informed! Get security alerts & expert tech tips – sign up for Kurt’s ‘The CyberGuy Report’ now.

A man scrolling on his Android phone (Kurt “CyberGuy” Knutsson)

What you need to know

By definition, SafetyCore is a system service that provides on-device machine-learning infrastructure to help detect sensitive content. It was introduced as part of Google’s Nov. 7, 2024, system update for Android 9 and later.

Advertisement

Google initially described SafetyCore as a tool that supports privacy-preserving user protections for apps. One of its first visible uses was in Google Messages, where it enables Sensitive Content Warnings, a feature that blurs images potentially containing nudity and prompts users with additional options before they can view or send them.

By default, Google System services automatically update your device with security, bug fixes and new features. Some updates are delivered via system services in separate Android packages. This maintains privacy, security and data isolation following the principle of least privilege because permissions are not shared with other functionality.

SafetyCore does more than detect nude images. Its built-in machine-learning functionality can also target, detect and filter images for sensitive content. There is no app icon, and it doesn’t appear in the usual list of running applications. Users must navigate through Settings Apps Show system processes to find it.

Android feature prevents sensitive content in Google Messages

A woman holding an Android phone (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR ANDROIDS – CYBERGUY PICKS 2025

What does Google say?

Google maintains that SafetyCore is purely an on-device classification service and does not report or share scanned content with Google or other entities. The company argues that the service enhances security without compromising privacy, allowing apps to detect and filter unwanted content locally.

Advertisement

We reached out to Google, and a spokesperson told Cyberguy, “Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data.

“SafetyCore is a new Google system service for Android 9+ devices that provides the on-device infrastructure for securely and privately performing classification to help users detect unwanted content. Users are in control over SafetyCore, and SafetyCore only classifies specific content when an app requests it through an optionally enabled feature.”

Google also says that as part of its continuous investment in the transparency of its products, the company is going above and beyond, adding binary transparency to SafetyCore. This allows users and developers to verify that SafetyCore is truly privacy-preserving, just like Google says it is. 

Android feature prevents sensitive content in Google Messages

A Samsung phone (Kurt “CyberGuy” Knutsson)

LOOKING FOR MORE WAYS TO LOCK DOWN YOUR ANDROID? HERE’S HOW TO DO IT

How to remove Android SafetyCore

Settings may vary depending on your Android phone’s manufacturer. (Note: We tested these steps on a Samsung Galaxy S24 Ultra.)

Advertisement

If you wish to uninstall or disable SafetyCore on your Samsung Galaxy, follow the steps below:

(Note: If you decide to disable or get rid of System SafetyCore, you may not be able to benefit from the new security and privacy features or enhancements that Google offers now or in the future.)

  • Open the Settings app on your device
  • Tap Apps
  • Scroll through the list or use the search bar to find Android System SafetyCore
  • Tap on Android System SafetyCore and check if the Uninstall option is available. If Uninstall is available, tap it to remove the service. If Uninstall is grayed out, you may only be able to Disable it
Android feature prevents sensitive content in Google Messages

Uninstall or disable SafetyCore on Samsung Galaxy (Kurt “CyberGuy” Knutsson)

If you wish to uninstall or disable SafetyCore on your Pixel device, follow the steps below:

Settings may vary depending on your Android phone’s manufacturer. (Note: We tested these steps on a Pixel 9 Pro.) 

  • Open the Settings app on your device
  • Tap Apps
  • Select See all apps
  • Scroll through the list or use the search bar to find Android System SafetyCore. Tap on Android System SafetyCore
  • Check if the Uninstall option is available. If Uninstall is available, tap it to remove the service. If Uninstall is grayed out, you may only be able to disable it
Android feature prevents sensitive content in Google Messages

Uninstall or disable SafetyCore on Pixel (Kurt “CyberGuy” Knutsson)

HOW TO CANCEL SUBSCRIPTIONS ON AN ANDROID TO SAVE MONEY

Advertisement

4 ways to keep your personal information safe

If you’re concerned about Google’s data collection and want to keep your personal information safe, here are four steps you can take.

1) Limit app permissions: Regularly review and restrict app permissions, especially for access to your camera, microphone, storage or location. If an app doesn’t need access, revoke it in your device settings.

2) Disable background data and tracking: Prevent unnecessary tracking by turning off background data for apps that don’t require constant internet access. You can also disable location tracking and opt out of Google’s personalized ads in your account settings.

3) Use a VPN for secure browsing: A VPN (virtual private network) encrypts your internet traffic, preventing your ISP, Google or other entities from tracking your online activity. Privacy-focused VPNs are great options that do not log user data. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

4) Regularly clear personal data: Delete unnecessary stored data such as search history, location history and cached files. You can do this in your Google Account settings and within individual apps to minimize your digital footprint.

Advertisement

Kurt’s key takeaway

SafetyCore is an interesting addition to Android, offering on-device content filtering with machine learning. While it aims to enhance privacy and security, some users might have questions about its presence and functionality. Whether you decide to keep it or explore disabling it, staying informed about your device’s features is always a good idea. This way, you can make choices that best fit your needs and preferences for managing your Android device.

Do you trust Google’s claim that SafetyCore operates entirely on-device and does not share your data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

GPU prices are out of control again

Published

on

GPU prices are out of control again

Every so often, Central Computers — one of the last remaining dedicated Silicon Valley computer stores — lets subscribers know it’s managed to obtain a small shipment of AMD graphics cards. Today, it informed me that I could now purchase a $600 Radeon RX 9070 XT for $850 — a $250 markup.

It’s not alone. I just checked every major US retailer and street prices on eBay, and I regret to inform you: the great GPU shortage has returned. Many AMD cards are being marked up $100, $200, $250, even $280. The street price of an Nvidia RTX 5080 is now over $1,500, a full $500 higher than MSRP. And an RTX 5090, the most powerful consumer GPU? You can’t even get the $2,000 card for $3,000 today.

Here, I’ve built tables to show you:

You shouldn’t just blame tariffs for these price hikes. In early March, we found retailers were already scalping their supposedly entry-level MSRP models of the new AMD graphics cards. Nor is this likely to just be high demand, given how few cards are changing hands on eBay: only around 1,100 new Nvidia GPUs, and around 266 new AMD GPUs were listed there over the past 30 days.

Here’s a deeper dive on the “MSRP” models of the AMD cards, which were all originally listed at $549 or $599:

Advertisement

I’ve focused this table on Newegg and Micro Center since they carry more models than any other retailer, though I also spotted “MSRP” 9070 XT cards at $800 and $850 at Amazon today, and an $830 card at Best Buy. Otherwise, these are the new sticker prices, not necessarily attainable prices, as most were out of stock.

From December 2020 to July 2022, I periodically tracked the prices of game consoles and GPUs during the covid-19 pandemic, when they were incredibly expensive to obtain. At one point, some GPUs were worth triple their MSRP. I’d love to hear from Verge subscribers in particular: is this a valuable service we should continue in the tariff era? Or do you just want to know when it’s safe to enter the water again?

Continue Reading

Technology

Hertz data breach exposes customer information

Published

on

Hertz data breach exposes customer information

Join Fox News for access to this content

You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive.

Please enter a valid email address.

Having trouble? Click here.

Most companies use different vendors to run different parts of their business, such as customer management, finances, payroll and social media. To do this, they share access to customer data with these platforms. The issue is that not all vendors take cybersecurity seriously, and hackers are well aware of that. 

More and more, attackers are going after these weaker links in the digital supply chain. These kinds of breaches often happen quietly, exposing large amounts of customer information without touching a company’s main systems. It’s becoming a serious concern for both businesses and their customers. 

Advertisement

One of the latest cases involves Hertz, the car rental giant, which recently confirmed that customer data was exposed because of a cyberattack on one of its software vendors.

Join the FREE “CyberGuy Report”Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Hertz rental location (Hertz)

What happened at Hertz?

Hertz, the global car rental company that also operates Dollar and Thrifty, has disclosed a data breach affecting thousands of its customers. The incident stems from a cyberattack on one of its third-party vendors, software provider Cleo, between October and December 2024. The breach did not compromise Hertz’s internal systems directly but involved data that had been shared with the vendor as part of its operational workflow.

The compromised data varies by region but includes sensitive personal information such as names, dates of birth, contact details, driver’s license numbers and, in some cases, Social Security numbers and other government-issued IDs. Certain financial information, including payment card details and workers’ compensation claims, was also among the stolen records.

Advertisement

In the U.S., disclosures were filed with regulatory bodies in California, Texas and Maine. Specifically, 3,457 individuals were affected in Maine and 96,665 in Texas. The total global impact, however, is believed to be far greater. Customers in Australia, Canada, the EU, New Zealand and the U.K. were also notified via breach notices on Hertz’s regional websites.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The breach is believed to be the work of the Clop ransomware gang, a well-known Russia-linked hacking group. Clop exploited a zero-day vulnerability in Cleo’s enterprise file transfer software, technology used by many large organizations to securely transmit sensitive business data. In 2024, the gang launched a mass-hacking campaign targeting Cleo users, ultimately stealing data from more than 60 companies, including Hertz.

Interestingly, while Hertz was named on Clop’s dark web leak site in 2024, the company initially stated it had “no evidence” its systems or data had been compromised.

When contacted by CyberGuy, a Hertz spokesperson said, “At Hertz, we take the privacy and security of personal information seriously. This vendor event involves Cleo, a file transfer platform used by Hertz for limited purposes. Importantly, to date, our forensic investigation has found no evidence that Hertz’s own network was affected by this event. However, among many other companies affected by this event, we have confirmed that Hertz data was acquired by an unauthorized third party that we understand exploited zero-day vulnerabilities within Cleo’s platform in October 2024 and December 2024.”

Advertisement
Hertz 2

Hertz rental location (Hertz)

200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH

What does this mean for customers?

While Hertz’s internal systems were not breached, the exposure of personal data, including driver’s license numbers, contact details and government-issued IDs, poses serious risks. Affected individuals may be vulnerable to identity theft, fraudulent account openings and targeted phishing attempts. If Social Security numbers were involved, the potential for harm increases significantly. Anyone who rented from Hertz, Dollar or Thrifty between October and December 2024 should be on high alert.

laptop

A hacker at work (Kurt “CyberGuy” Knutsson)

MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT

7 ways to protect yourself after the Hertz data breach

If you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Hertz data breach.

1. Watch out for phishing scams and use strong antivirus software: With access to your email, phone number or identification documents, attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

2. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Hertz breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.

3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Hertz breach, including Social Security numbers, driver’s license and bank information. This makes you a prime target for identity theft. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.

4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit. 

5. Monitor your credit reports: Check your credit reports regularly through AnnualCreditReport.com, where you can access free reports from each bureau once per year or more frequently if you’re concerned about fraud. Spotting unauthorized accounts early can prevent larger financial damage.

Advertisement

6. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.

7. Be wary of social engineering attacks: Hackers may use stolen details like names or birth dates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key. 

HACKERS USING MALWARE TO STEAL DATA FROM USB FLASH DRIVES

Kurt’s key takeaway

Cyber risk doesn’t always come from a company’s own network. It often originates in unseen corners of the digital supply chain. Even as companies double down on internal cybersecurity, they must be equally rigorous in how they vet and monitor third-party vendors. For consumers, it’s no longer enough to trust the big brand on the label. The data trail is wider, the attack surface larger and the consequences far more opaque. 

Advertisement

If companies can’t protect our data, should they be allowed to collect so much of it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Everybody wants to buy Chrome

Published

on

Everybody wants to buy Chrome

For sale: one browser, very popular. As the remedies phase of the Google Search trial heats up, two things have become very clear. The US government would really like to force Google to sell Chrome, and there are a lot of companies interested in buying it. What do you really get when you buy the world’s most popular browser, though? And what would it really cost?

On this episode of The Vergecast, Nilay, David, and The Verge’s Jake Kastrenakes try and find the right buyer for Chrome. But before that, we have some news to get to. News including that we won the Webby Award for Best Technology Podcast! Thanks again to everyone who voted for us — we were up against some excellent competition, and we’re thrilled you picked us. We also have some Party Speaker Capitalism Updates, some thoughts and stories about trying to buy a Switch 2, and a lot of confusing new information about tariffs. I mean, it’s one gadget, Michael. What could it cost, ten dollars?

After that, we head into the courtroom, where both Google and Meta are fighting for their antitrust lives. We talk about what the trial means for AI companies and search competitors alike, and why there aren’t as many realistic Chrome buyers as you might think. There might only be one that makes sense. (One we fail to even consider: Yahoo, which said it was interested just after we finished recording.) We also discuss Instagram co-founder Kevin Systrom’s scorching testimony in the Meta trial, and why it might be damaging to Meta’s case.

If you want to know more about everything we discuss in this episode, here are some links to get you started, first in gadget and tariff news:

And in the lightning round:

Advertisement
Continue Reading

Trending