Google Nexus 6 January Patch Rolled Out by AT&T
We have great news for Nexus 6 owners who are residents in the US. The major US network carrier known as AT&T just started rolling out Google’s latest security patch. The update weighs in at 26MB and it includes the “NDB91W” software build. The January security update includes a bunch of fixes which significantly increase Nexus 6’s overall user security.
It’s great seeing that Google puts such a high price on Android security. The US based tech giant is known for always launching a security bulletin every month. The fact that Google provides such a constant stream of software updates is one of the things which make owning an Android powered device worth it. While launching a new security patch each month might sound drastic, it’s quite necessary. Even though Google puts a high price on security, some major threats still manage to slip through the cracks.
AT&T posted the full patch notes on its website and sadly, the security patch doesn’t include nothing else than security fixes. The US network carrier started rolling the update OTA (over the air) and it should arrive any time soon. In case it hasn’t arrived, the update can be always downloaded manually. In order to do that, users have to access their Settings panel and look for it there.
Google advises everyone who wants to update their software to do it through a stable Wi-Fi connection. This way there won’t be any extra data consumed. Additionally, another good tip from Google is to keep the designated device charged around 50 percent so that the installation process doesn’t get interrupted.
We should mention that this update is rather important because it has been specially developed to fix one major threat that’s affecting Nexus 6 devices. January’s security patch fixes an exploit that’s based in Android Debug Bridge which allows hackers to forcefully get access to Nexus 6 and Nexus 6P devices. Gladly, there aren’t any reports to show that this exploit was used by someone. Especially since the hacker would have needed physical access to the targeted device so that it could be connected to a PC via USB.