Have you always wondered why the carrier and manufacturers don’t release timely android security updates for your smartphone? You may soon have the answer to that question, as the FTC (Federal Trade Commission) and FCC (Federal Communications (FCC) are asking the same question. Both the U.S. Government agencies have issued an order to Google
, HTC, Motorola, LG, and Samsung
to release information on how the security updates are released for the users.
FCC and FTC have also launched an official inquiry into top brass cellular services - AT&T, Sprint, Verizon
, U.S. Cellular, TracFone, and T-Mobile to explain how the end users receive the android security updates. Android security continues to be the talk of the town, and the whole discussion convinced Google to release monthly security updates.
The Nexus devices which are controlled directly by Google, receive regular security updates, while other OEMs take their sweet time. IN the official press release by the U.S. internet security agencies, there was a specific mention of the Stagefright
exploit and how its malware affected more than a billion Android devices. While Google was quick on patching the Stagefright vulnerability with a security update, OEMs and carriers took a considerable amount of time.
“Consumers may be left unprotected, for long periods of time or even indefinitely, by any delays in patching vulnerabilities once they are discovered. To date, operating system providers, original equipment manufacturers, and mobile service providers have responded to address vulnerabilities as they arise. There are, however, significant delays in delivering patches to actual devices—and that older devices may never be patched.”
All of the above mentioned Android manufacturers, OEMs, and carriers have been given 45 days to respond to the query. However, FCC and FTC have not made it clear what their next course of action against untimely Android security updates will be. At the end, it is good news for the end users, who will be better protected against the latest exploits and malware.