Google's January security patch aims particularly to Nexus 6 and 6P devices as the company discovered a high-severity exploit from the previous patch that can allow attackers to listen in on calls and steal user's data, according to a report by PC World.
The exploit, which was discovered by Ars Technica U.K., can be accessed through hidden USB interfaces from the two Nexus devices. The company stated that by rebooting the device with custom bootmodes, a potential hacker can use this to his or her advantage and override a secure USB configuration and gain privileges on the on the device, that can cause data theft, data corruption or even data destruction.
Ars Technica UK also stated that the Nexus 6 devices were the more vulnerable than the two, although newer devices could still be used to enter into the modem's AT interface that would let hackers send or eavesdrop on SMS messages and bypass proper authentication.
In addition, Sprint has rolled out its latest update to the Nexus 6P according to a report by GSM Arena. The latest build will be version N4F261 based on Android 7.1.1, will bring security patches, performance and stability improvements.
Google releases its patches every first or fifth day of the month, which is timely since the latest update comes as build date Jan. 5, 2017.
The update has just begun to roll out therefore it may take a while for your devices to show an update notification. If you're feeling impatient though, you can manually do check by going to Settings>About>Software updates, there you can check if you have an update for your device.
Have you received you update yet for your Nexus 6 or 6P devices? Write and share your comments below. You may also subscribe to our newsletter if you want to receive the latest news and updates.
© Copyright 2024 Mobile & Apps, All rights reserved. Do not reproduce without permission.