CALIFORNIA – The Android operating system has long been said to be vulnerable in matters of security. The latest news states, through the recent study conducted by the University of Cambridge, it was concluded that 87 percent of Android smartphones have problems to security.
The educational institutions have conducted research using data collected by the application called “Device Analyzer”. The application is available in the Google Play Store since 2011 for free.
Meanwhile, the University of Cambridge has collected data from Android Version and build number information of more than 20,400 devices. Similarly, as quoted fromArsTechnica, Wednesday (14/10/2015).
In the study, 87 percent of Android smartphones are vulnerable, at least one of them must have kecatatan problems in the system.
As it is known there are 11 issues kecatatan most popular system in the world of Android.One is Stagefright.
Researchers also said that the cause of the vulnerability that is so much going on in the Android smartphone is caused by the OEM (vendor). Vendors often too late even failed to send an update to patch the vulnerability gap in Android.
Along with the study, Cambridge also released what they call “AndroidVulnerabilities.org”. In this site, they provide an assessment of the vendor (OEM) and hardware from most secure to the vulnerable.
The study mentions, Google Nexus, is the most secure in their records, with a score of 5.2.Underneath followed by LG (4.2), Motorola, Samsung, Sony, and HTC.
Why Google Nexus could be the safest? it is because they are a vendor that actively encourages update for Nexus devices. But Google also quipped, because although they are consistent to seek updates on the device, still they do it very slowly.
It can be seen from the Nexus update, although an update is available, but has actually released OTA will take up to 2 weeks.
Another problem, vendors are usually no longer sends updates to the device over the age of two years. Meksipun some time ago the vendor committed to send updates every month to a smart device, but with the policy, old devices still will not get a solution.
Therefore, in this issue, the study suggested that the vendor can send regular updates on a regular basis to the smart device to patch the security vulnerabilities gap.