Jan 13, 2017 12:18 PM EST
Nexus 6/6P Gets January Security Patch Against High-Risk Data Access; Google Rolls Out Most Secured Android Fixes Via OTA
Motorola's Nexus 6 and Huawei's Nexus 6P are the first phones to receive the January security patch from Google. Google was able to detect 95 exploits from android phones alone. The exploits have infected the android operating system though device reboot.
Unaware of security of the exploit, Nexus 6 and Nexus 6P users might have clicked to agree to an access request to update their units. This incident seems secured at first especially to people unaware of its hidden content. These exploits contain high-severity vulnerabilities. Google has rolled out its Security Patch for the month of January to prevent further casualties from Android users, Gadget360 reported.
Over-The-Air (OTA) updates arrive at Nexus 6 and Nexus 6P phones to block. Google has secured all modems in the phones and prevent another attacking attempts to access users' personal and private data. Google has posted in its Android Security Bulletin the security level strings are coming to strengthen blockade to attacks.
The partial security level string 2017-01-01 indicates that all the previous issues have already been cleared. On the other hand, the complete security level string 2017-05-01 indicates that issues associated with 2017-01-01 have been fixed, Gadget360 added. Google's January Security Patch was able to fix about 95 high-risk vulnerabilities whereas 23 bugs are fixed by 2017-01-01 security patch while 72 are fixed under 2017-01-05 security patch.
According to the security bulletin, they were able to inform their OEM partners on Dec. 5 and Google released an Android Open Source Project (AOSP) repository in the next 48 hours. At present, Google was able to fix two dozens of high-severity vulnerabilities and 10 critical issues. In the end, Google has clarified that there were no reports of active customer exploitation or abuse of these newly reported issues.
How was your Nexus experience so far? Tell us in the comment box below.