Google’s LG Nexus 4 and Nexus 10 devices are now getting an over-the-air update to Android 4.2.1—just in time for December.
The update brings the Jelly Bean build to JOP40D and fixes the December bug that wouldn’t allow users of the People app to select a date in December for a birthday, anniversary, or similar event.
There isn’t much else different in the software release, and it is unknown at this time if this latest version of Jelly Bean will also land for the Nexus 7 or Galaxy Nexus. However, like most OTA updates, 4.2.1 is rolling out in phases. So, it could take a few days before it is available to all.
When Google announced some updates to Google+ during its I/O keynote this week, perhaps apart from the new iPad compatible tablet version, the most talked about new feature was the Facebook-like invitations called “Events.” While Google calendar integration in the Events feature was supposed to be a big selling point, Google unfortunately did not provide users with control over which invites were added to their calendars. The issue led to massive amounts of spam in the form of notifications and calendar entries—most notably for Google+ users with large followings. Robert Scoble outlined the problem in a Google+ post:
Hey, +Vic Gundotra the way you rolled out the new Google+ events feature was — by far — the worst social launch ever… Not only did it spam the crap out of my notifications and my Google+ events page but it added events — hundreds of them — onto my calendar…My calendar is MINE. Not yours. You should NEVER put anything on it that I don’t approve of… I have turned down every event and they are still on my calendar so now I have to delete them one-by-one… By the way, I’ve been asking for noise controls since day one and you guys simply aren’t getting it. Amazingly bad service here folks.
As noted by Scoble, another avid Google+ user, Will Wheaton, highlighted the issue and received a response from Google’s Senior Vice President of Engineering Vic Gundotra: Read more
The fine folks over at Android Police have discovered that many HTC devices have a huge security hole due to a recent Android update. The results are pretty shocking, and HTC has no one to blame but themselves. In a recent update, HTC included a set of logging tools that logs users email accounts, last known network and GPS connection, phone numbers that have been recently dialed, encoded SMS data (probably can be decoded), and system logs.
Okay so HTC logs all of this, what’s the big deal? The big deal is that any app that requests android.permission.INTERNET can get their hands on this information. Phones include the Thunderbolt, Evo 4G, Evo 3D, and more.
As of now, the only way to patch this hole is to root your device and remove /system/app/HtcLoggers.apk. If you’re not rooted, stay away from sketchy apps. As Android Police points out, even a high-quality app could still get their hands on this information. Android Police has all of the technical details.
BGR has discovered a pretty big security flaw in AT&T’s version of the Galaxy S II, which hits shelves tomorrow. For users who have a unlock pattern or pin set, they can simply bypass it by waking up their screen to unlock and then let the screen timeout to go black. Then simply, the user can wake up the phone once again and they’ll no longer have to use a pattern or pin to access the phone. BGR shows how simple it is in the video above.
Samsung offers a temporary work around, while they work on a permanent solution, after the break: