Stagefright bug was found 10 days ago.The horrifying bug permits an attacker to remotely execute code through an imposter sight and sound instant message, by and large without the client not even seeing the message itself. Google worked at its best to control and dispatch the bug but it eventually took time. Now Biggest Android security Update for Stagefright bug is ready to fight with bug. This update will be soon available in the market.
Biggest Security Update in History Coming Up: Android Introduces Security Update for Stagefright Bug
Adrian Ludwig, lead engineer for Android security at Google, said that
All Nexus gadgets will be fixed, and Samsung, Motorola, HTC, LG, Sony, Android One, and many different producers are going to push out the patches as well, he said. Some handset sellers, as Silent Circle, have effectively fixed their working frameworks.
Dong Jin Koh, EVP of Samsung Electronics, Mobile R&D Office also shared his views by saying that:[pull_quote_center]”With the recent security issues, we have been rethinking the approach to getting security updates to our devices in a more timely manner, Since software is constantly exploited in new ways, developing a fast response process to deliver security patches to our devices is critical to keep them protected. We believe that this new process will vastly improve the security of our devices and will aim to provide the best mobile experience possible for our users” [/pull_quote_center]
What’s more, Google, Samsung, and LG have made a promise to convey month to month security patches to clients that will settle any up and coming issues in the working framework. These redesigns have been conveyed to makers for a considerable length of time, however now end clients will get them as well, and they will proceed for no less than three years after the dispatch of any new handset.
Ludwig also said:[pull_quote_center]”We’ve looked at the events of the last few weeks and realized we need to move faster, and that we need to tell people what we are doing, The Stagefright flaw was a serious issue, with 95 per cent of devices potentially vulnerable but there were mitigating factors. Android Jellybean 4.1 or later devices had address space layout randomization (ASLR) to block memory exploits, he said, and this bought enough time to sort out the issue.”[/pull_quote_center]
Moreover he also promised that:[pull_quote_center]”It’s not just about the updates: Google is investing considerably in hardening up the Android ecosystem and blocking applications that could be considered malware”[/pull_quote_center]
Later in month of June, Google declared Security Rewards for Android, a bug abundance conspire particularly for the versatile working framework. The prizes incorporate littler payouts for basic bug discovering, like the abundance framework for Chrome, however for full adventure chains demonstrating a bug, exploitable confirmation of idea, and bringing about getting entrance to the TrustZone in Android, the payout could net up to $38,000 for specialists.
Engineers are likewise going to be getting notices if their code is found to break the tenets, either unintentionally or by configuration. So far Google has cautioned engineers about more than 60,000 applications, however Ludwig said he needed that slice to zero over the long period of this journey.