After weeks of rumors, Google has finally unveiled their most advanced smartphone. LG/Google Nexus 5 was presented along with the latest update of the OS, Android 4.4 KitKat.
The wait has been long, but now we have all the information about your phone. Although the presentation was expected the 1. November, meant Google that Halloween was a perfect occasion to unveil the highly anticipated smartphone and its latest operating system. All the rumors about the specifications proved to speak true, so there were no surprises. At the press conference said Sundar Pichai, that they wanted to win the next billion users with this device, and the new operating system. Sundar Pichai says that Nexus 5 is ‘ the nicest and fastest phone to date “, which provides the most innovative Android platform for consumers, as well as a more advanced Android experience.
Google Nexus 5
Because we have already written about Nexus 5-specifications – abbreviationfinder, we want this time to focus on the latest operating system from Google, Android 4.4 KitKat, compatible with devices which have 512 MB RAM or more. This interface reminds strongly of Jelly Bean US, but Google introduced some graphical changes with KitKat US. For example – the status bars and navigation are now transparent. By dragging your finger to the left, you open Google Now, directory developed by Google. It is enriched with new features and functionality: it allows you to collaborate with apps directly. Speech recognition has also been improved. Android KitKat has also introduced a new software with HDR technology that lets you take several pictures in a few microseconds and then automatically corrects the image.
With you also get possibility for KitKat to wake the phone, send SMS or use other features by saying “Okay Google”.
A few days ago some researchers have discovered a critical vulnerability in “Stagefright, a media playback engine that is part of Android for some years. This vulnerability is potentially very dangerous, because it allows you to automatically infect a device with no possibility of avoiding it by user.
All a hacker needs to do to infect a device is to create a short video with malicious code in it and send it via MMS. Some apps process messages of this type in the exact moment in which they are received, even before playing the notification tone, so that it is immediately usable by the recipient. At the exact moment the video is processed, you enable the malicious code that attacks “Stagefright and from that point on the phone is compromised.
A hacker has virtually free access to any data and operation on device: can delete and copy information undisturbed or take control of the camera and other sensors.
The vulnerability of “Stagefright is present in almost all Android devices. According to the researchers, there are approximately 95% of the market. There are thankfully some extenuating circumstances significant: first, by now in a few using MMS (many don’t even more its APN configured); Second, only some apps process instantly multimedia messages, for example Hangouts. Integrated messaging apps, or even Google Messenger, typically do not behave this way. This allows the end user to decide whether to open a suspicious message from an unknown sender.
If you want to check if your device is affected by this vulnerability have been released on Google Play some apps “” Stagefright Detector”; Please note that Zimperium, or researchers who have discovered, and that of Lookout. There may be others, but on things like these it’s easy that malware proliferate. Better stick to super safe sources like these two.
Multimedia messages are only the most dangerous to lead an attack on “Stagefright, but the problem is built into Android. In fact, all you need to hit a device is an infected video in the “right” way. The point is that from any other channel, the vulnerability of “Stagefright is just” one of many “: If coming from the browser, for example, the user must voluntarily download the video and play it back.
The security flaw, then, is an integral part of the Android code. Google has thus put to work to resolve it, and prepared a corrective patches in a timely manner. Updates for all Nexus devices (4) were already released in the day yesterday. Other producers have probably received the correct code very quickly, and will likely have to work on her adapting to device already placed on the market. The exact timing of release of course are not known, but it is likely that it will be a few weeks at most. Harder to predict is what percentage of devices will get the update. Will come on any product? Or only on those so called “peak”? How many will fall behind?
In fact, at least right now, the chances of being attacked by exploiting the vulnerability of “Stagefright are pretty slim. For starters, researchers have not disclosed how va created the video, then the bad guys will have to find the solution on their own. Second, as mentioned earlier, the MMS has never been very popular, and with the advent of instant messenger via the Internet are now at historic lows. For safety, in any case, it is better to turn off its APN.Third, most apps preinstalled in a messaging phone cannot process the content automatically, thus leaving some room for maneuver to end users.
In General, you should turn on their messaging app (instant and SMS) the automatic retrieval of multimedia content, and of course is the golden rule to be careful who you sendwhat .
By the time the whole thing “Stagefright entailed for us users only advantages, and also very interesting. Google, for example, announced a new policy for updates that will be releasedsecurity updates on a monthly basis, and for three years from the release date of a device. At the same time, support for the release of new versions of Android has been extended from 18 months to 24. Samsung has released a similar statement on the security side, promising also updates on a monthly basis (no mention about 18 to 24 months software support extension, though). Also LG has joined the other two, through a press release issued by Wired yesterday evening:
LG will be providing security updates on a monthly basis which carriers will then be able to make available to customers immediately. We believe these important steps will demonstrate to LG customers that security is our highest priority.
It is therefore more than likely expect that other manufacturers-at least the big, like Sony, HTC, Huawei, Motorola, etc-will align with this new policy, although at the time were not released official designations.
How To Install Official 5.0 Lollipop Update Nexus 5 …
ASUS launches two new docks for the 2013 Nexus 7 tablet
Cult of Android
10 cool things to try with Android Lollipop …
Civilization Revolution 2 Finally Gets A Turn On Android
James Franco shows off Droid Turbo, Alienware Area 51 …
Borderlands: The Pre-Sequel, First Announced For The …
Android Auto’s wireless mode to work on non-Pixel phones …
Huawei Nova launched in SA, but what about Plus?
Facebook Pages Manager For Android Finally Installable In …
The Tablet Battle: Apple iPad 2 vs. Samsung Galaxy Tab 10 …
Continuous Deployment via GitLab, Jenkins, Docker and Slack
Google’s Lollipop Messenger now available for all : News …
Google finally launches an AdWords app for iPhone and iPad …
FFVIII’s Laguna Loire Joins Dissidia 012 Final Fantasy
Amazing Spider-Man #1 Spoilers Via All-New All-Different …
After five years of partnership, the plug is pulled …
Nokia X2-01 Price in India Rs. 4459
Technology In School
More LG G4 images leak, Google Store launches, Nexus 5 …