August 7, 2015 By Shane Schick 2 min read

Google’s decision to change the way it handles Android updates may prove more helpful than ever following a barrage of vulnerabilities that could seriously jeopardize those using devices that run the mobile OS.

Most recently, researchers at Trend Micro warned of a bug that, regardless of the latest Android updates, could make smartphones and tablets inoperable by causing an endless reboot. Though a fix is now available, according to SC Magazine, it could potentially affect nearly 90 percent of the operating system’s users.

While these sorts of vulnerabilities tend to prompt swift reaction from Google, the company is trying to avoid the unexpected by issuing monthly over-the-air Android updates to its Nexus devices, Threatpost reported. This means Google will be able to address any potential security problems more regularly and directly than carriers, who might not be as quick or proactive.

This new approach to Android updates probably can’t come soon enough for some consumers, given the recent spate of bugs. As a post on The Hacker News pointed out, the recently discovered Stagefright vulnerability had already put almost 950 million Google-powered smartphones at risk simply by using a text message that directed people to a specially crafted Web page.

On the other hand, Stagefright may have offered proof that Google’s Android updates aren’t the only way to combat a security crisis. The Verge said the bug was directly responsible for Samsung launching its own monthly patch program, with HTC, Sony and others working to make sure their own customers remain safe. As fragmented as the Android market sometimes seems to be, the vulnerabilities may be forcing the industry to form a more united front against cybercriminals.

Researchers at IDC and Forrester said much the same thing to Network World, suggesting that while experts have been calling out for more regular Android updates for some time, Stagefright and the endless reboot bug may end up being the catalyst for change these vendors needed. Of course, they may have little choice. If consumers and enterprises keep seeing these kinds of risks pop up week after week, you couldn’t blame them if they started looking at iOS as an alternative.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today