The Asian Age

Android devices lie about security patches: Report

Research shows that most Android OEMs don’t actually deliver promised and timely security patches to handsets

- AGE CORRESPOND­ENT

What matters to you the most while going for a new Android smartphone? Unless you are a shutterbug or someone conscious about brand value, then software updates take up the utmost preference while choosing your phone. Usually, Google’s stock Android builds are slated to get the fastest updates, followed by other manufactur­ers who ship with extensivel­y customised interfaces.

Since Android is an open- source operating system, it’s also vulnerable to malware and other forms of deadly cyber attack. Timely security patches from OEMs promise to fix those, provided OEMs deliver them on time. However, a recent study conducted by Security Research Labs has unearthed a startling fact related to the rollout of security patches. The report by Wired suggests that several Android OEMs who promise to deliver the latest security patches often mislead their customers by not delivering those patches at all. Several OEMs, particular­ly from the Chinese market space, often skip on security patches. In order to shove sand over their mistakes, they simply mention that the devices are running on the latest updates, i. e. they lie about rolling out the patches in the first place. The study was conducted on the firmware of 1200 smartphone­s from various manufactur­ers.

While top- tier brands such as Google and Samsung mostly came out as the honest ones, several mid to low tier brands such as HTC, Xiaomi, Huawei, Motorola and

LG follow this practice quite often. In fact, TCL and ZTE are the only two names that have been found to top the list by skipping the security patch updates, despite showing in the Device Info section that updates are installed. If you are cross with your phone’s manufactur­er, then you should also consider the reason as to why they do this. With stock Android ROMs, it’s easier to roll out patches as the changes incorporat­ed in the system are easy to implement, without affecting most system elements. However, with extensivel­y customised ROMs, a new security patch for a particular vulnerabil­ity could break something else or de- stabilise the system. Therefore, OEMs prefer to either remove the feature that has the vulnerabil­ity or don’t bother if that device lacked the feature in the first place. Additional­ly, it was also found that cheaper device running on cheaper chipsets from MediaTek and Huawei’s Silicon are found to feature lots of vulnerabil­ities built in the chipset itself. So, if the chipset had the flaw, the OEM could do nothing until MediaTek rolled out the patch for the chip’s flaw. A recent example in the parallel universe of PCs is Intel’s Spectre and Meltdown issues, which has been declared to be unfixable for most old PCs. While Google is investigat­ing the findings of the report, it’s advised to opt for phones from those manufactur­ers who treat software support pretty seriously. Google’s Pixel branded phones are your best bet regarding these issues. Samsung isn’t one of the first ones to roll out security patches, but it’s ens- ured that most of their premium devices get it. The more customised your phone’s OS, the lesser the chances of it receiving the latest patche to vulnerabil­ities.

 ??  ??

Newspapers in English

Newspapers from India