News

Google Plans Monthly Security Patches for Nexus Post Stagefright

The newfound Stagefright exploit discovered on the Android platform led to security patches being delivered, and Nexus device owners are scheduled to be receiving patches very soon.

However, Google has announced that it won’t just stop there and will make sure that new security based patches are rolled out every month on the Nexus platform.

The same patches will also be made public via the AOSP (Android Open Source Project), and the blog post by Google read, “Nexus devices will continue to receive major updates for at least two years and security patches for the longer of three years from initial availability or 18 months from last sale of the device via the Google Store”.

If you are unaware of the Stagefright exploit, here’s a little background on it. The exploit was discovered by a security firm recently and works when a hacker sends you an infected video file via MMS. Once the file is downloaded automatically, the exploit is triggered and the hacker gains control of your Android phone.

The immediate solution to prevent this exploit is to turn off auto-retrieve from your MMS settings to make sure no files are downloaded automatically without your consent. According to the initial reports, hackers can even send infected files which are automatically deleted after triggering the exploit, which means you may not even know your phone is hacked.

Google has however shown that it takes security issues seriously and has consequently announced plans to roll out regular security based patches for Nexus devices. It is expected that patches for the Stagefright exploit should be available for download on Nexus 4, 5, 6, 7, 9 and 10 today.

The company has also tightened the noose around harmful apps on the Play Store and it is believed that Android is generally becoming safer with time.

Do you own a Nexus device? If so, do let us know when you get OTA notifications for the security patches. Meanwhile, feel free to share your thoughts about the Stagefright exploit with us.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

To Top