• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

FTC and FCC wants tech firms and mobile carriers to explain why security updates take too long

Updated on May 10, 2016 by Guest Authors

Regulators in the United States have kicked off an investigation into the practices of mobile carriers and tech companies in rolling out security updates to their products, seeking to know why it is taking too long for those security patches to reach compromised mobile devices.

The way things are with software updates, the majority of Android devices in particular receive patches and enhancements after quite a longer period than, say, iPhones do. In the event of a security compromise, those devices will get security fixes longer than it should take. As a result, there is a growing concern among mobile users that their personal data stored in smartphones and tablets are increasingly becoming less safe, especially that they are in the hands of the tech firms in question such as Google and Apple, among others.

android-update

Specifically, the FCC asked several companies including the major carriers AT&T, Verizon, T-Mobile, and Sprint to brief the regulator on how they review and roll out security updates to mobile phones they are offering. Meanwhile, the FTC also invited tech giants Google, Apple, Microsoft, and Samsung, among other mobile titans, to provide information on how they are checking and issuing security updates to their respective products.

The regulators are giving these companies a month and a half to address their requests, especially those companies that sell smartphones and offer mobile contracts in the United States. After the response period, the FTC and FCC will evaluate how those tech giants responded and share insights between one another on the best practices to address the security concerns of mobile users.

The request, however, does not constitute a formal launch of an inquiry, nor does it mean a rule is coming soon for mobile companies and carriers. The goal of the request is to assess what mobile carriers are currently doing to issue patches for vulnerabilities in a quick manner and what challenges they encounter along the way.

Part of the inquiry process covers questions about when original equipment manufacturers get alerts related to a software vulnerability and when security updates are rolled out. The problem with Google’s Android, in particular, is that there are many versions of the mobile operating system, and each is modified according to the taste of mobile carriers. That makes it hard for Google to issue updates to security holes as quickly as possible. The updates need to go through the mobile carriers before they reach the intended users.

Addressing this concern is increasingly important at a time when the threat landscape is growing.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Hoover SmartWash Pet Complete Automatic Carpet Cleaner: A Comprehensive Review

TORRAS COOLIFY 2S Neck Air Conditioner Review – A Revolution in Personal Comfort

Munbyn P44S Wireless Thermal Label Printer Review

OAK & IRON Wave Electric Outdoor Inflator Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Hoover SmartWash Pet Complete Automatic Carpet Cleaner: A Comprehensive Review
  • The Downsides of Using a Monitor Light Bar
  • TORRAS COOLIFY 2S Neck Air Conditioner Review – A Revolution in Personal Comfort
  • Celebrate Mother’s Day with BLUETTI’s Portable Power Solutions

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}