Android to receive monthly security updates
Security experts have warned for years that Android devices receive critical updates from manufacturers either too slowly or not at all.
The first such security patch is in fact rolling out right now to the Nexus 4, Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, and Nexus Player, fixing the aforementioned Stagefright exploit. Most of the fixes for these issues, however, only arrive in the form of point updates.
Now Google’s Android partners including Samsung, LG, Motorola need to follow to implement a similar regular updating process to make sure Android is save for its customers.
The news comes after Google announced that it will roll out monthly security updates to Android and its range of Nexus devices.
The previous rendition, the Nexus 5 2013 was manufactured by LG Electronics and has been well- accepted by several Android users.
This Google Operating System Safety Warnings in Android M will check the Android device while booting to guarantee that the OS is safe enough. Moreover, there are a plethora of upcoming devices running Android Lollipop yet to be unveiled. The people using Samsungs, LGs, Motorolas, HTCs, Sonys, and a whole host of other brands’ phones and tablets? Android Police reports that Sprint has already rolled out updates for its versions of Samsung’s recent flagships, going back to the Galaxy S5.
The Stagefright vulnerability is said to be the biggest Android security problem for years now. I’d be perfectly fine if Verizon Navigator never worked again if it meant I wasn’t still vulnerable to Stagefright, but Verizon isn’t okay with that. Google’s announcement is sort of an extension of an existing security practice.
“Device fragmentation is not the only challenge that developers face when building for Android, as the operating system itself is extremely fragmented”, the firm said. It’s a limited sample size, and may not take into account all markets (though they do say they have devices from China). Unlike spear-phishing, where the victim needs to open a PDF file or a link sent by the attacker, this vulnerability can be triggered while you sleep.