{"id":33718,"date":"2020-03-06T11:30:08","date_gmt":"2020-03-06T11:30:08","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/"},"modified":"2020-03-06T11:30:08","modified_gmt":"2020-03-06T11:30:08","slug":"more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/","title":{"rendered":"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research"},"content":{"rendered":"<p>File this one under &#8220;well, duh.&#8221; Consumer mag Which? today <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.which.co.uk\/news\/2020\/03\/more-than-one-billion-android-devices-at-risk-of-malware-threats\/\">published research<\/a> estimating that over a billion Android devices are vulnerable to hackers and malware as they are not receiving security updates.<\/p>\n<p>Data obtained from Google by the publication found that 42.1 per cent of active Android users are languishing on version 6.0 or earlier.<\/p>\n<p>The most current version of Android is version 10, while Android 9.0 Pie and Android 8.0 Oreo continue to receive updates. The Chocolate Factory is expected to release a major update to the world&#8217;s most popular mobile operating system, Android 11, later this year.<\/p>\n<p>Anything below Android 8.0, therefore, is vulnerable. Extrapolating from the data, Which? believes that almost one billion Android phones are inherently vulnerable.<\/p>\n<p>Compounding the problem is the proliferation of older devices on sites like Amazon, where they&#8217;re sold by third parties. The mag bought a handful of phones \u2013 including the Motorola X, Sony Xperia Z2, and Samsung Galaxy A5 2017 \u2013 and found they were susceptible to a host of long-discovered vulnerabilities, including <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2015\/07\/27\/android_phone_text_flaw\/\" rel=\"noopener noreferrer\">Stagefright<\/a>, Bluefrag and the Joker Android malware.<\/p>\n<p>Which? is encouraging those with older phones who can&#8217;t update to take sensible precautions \u2013 such as avoiding side-loaded apps and ensuring their data is backed up.<\/p>\n<p>Of course, there&#8217;s no silver bullet. The mere existence of a patch doesn&#8217;t necessarily mean that manufacturers will actually send them downstream to devices in a timely way \u2013 or, indeed, at all.<\/p>\n<p>Google makes a point of delivering monthly security updates to its Pixel phones. Besides that, there are also phones released under the Android One programme, which ensures devices receive at least three years&#8217; worth of security updates, as well as two OS upgrades.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/02\/03\/sad_android.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Sad Android\"><\/p>\n<h2 title=\"MediaTek chipset flaw already exploited in the wild\">Android users, if you could pause your COVID-19 panic buying for one minute to install these critical security fixes, that would be great<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2020\/03\/05\/google_march_android_fixes\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Nokia is perhaps the best example of a vendor that&#8217;s jumped on the Android One bandwagon. It&#8217;s therefore no surprise that last August, Counterpoint Research ranked it as <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.counterpointresearch.com\/nokia-leads-global-rankings-updating-smartphone-software-security\/\">the top manufacturer for providing device updates<\/a>, with 96 per cent of devices sold since Q3 2018 on the latest and greatest version of Android.<\/p>\n<p>Following close behind was Samsung and Xiaomi, which had 89 and 84 per cent of their users on the latest version respectively.<\/p>\n<p>Ultimately, this issue is down to the fact that Android has always been utterly fragmented. From its inception, Google has allowed vendors to have almost free rein. This contrasts wildly to Apple, which is known for exercising tight control of its iPhone platform.<\/p>\n<p>And while Google&#8217;s approach has allowed a broad sense of differentiation in the smartphone market, it&#8217;s come with a cost to consumers.<\/p>\n<p>Manufacturers can determine the life cycle of a phone, and how long it should receive updates. The fewer updates, the less they have to spend in terms of people hours.<\/p>\n<p>Which? is calling for manufacturers to exercise greater transparency and explicitly outline how long their devices will receive critical software updates.<\/p>\n<p>In a statement, Kate Bevan, Computing Editor at Which?, said: &#8220;It&#8217;s very concerning that expensive Android devices have such a short shelf life before they lose security support \u2013 leaving millions of users at risk of serious consequences if they fall victim to hackers.<\/p>\n<p>&#8220;Google and phone manufacturers need to be upfront about security updates \u2013 with clear information about how long they will last and what customers should do when they run out.&#8221;<\/p>\n<p>Which? also wants action on a legislative level to ensure that there&#8217;s a benchmark for how long a device will receive updates \u2013 although it didn&#8217;t specify how long.<\/p>\n<p>&#8220;The government must also push ahead with planned legislation to ensure manufacturers are far more transparent about security updates for smart devices \u2013 and their impact on consumers,&#8221; said Bevan. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1901\/-8266\/quit-your-addiction-to-storage?td=wptl1901\">Quit your addiction to storage<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/03\/06\/1_billion_vulnerable_android_devices_which\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Consumer mag Which? calls for manufacturers to be open about how long they will support devices File this one under &#8220;well, duh.&#8221; Consumer mag Which? today published research estimating that over a billion Android devices are vulnerable to hackers and malware as they are not receiving security updates.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33719,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-33718","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-06T11:30:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research\",\"datePublished\":\"2020-03-06T11:30:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/\"},\"wordCount\":651,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/\",\"name\":\"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg\",\"datePublished\":\"2020-03-06T11:30:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/","og_locale":"en_US","og_type":"article","og_title":"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-06T11:30:08+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research","datePublished":"2020-03-06T11:30:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/"},"wordCount":651,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/","url":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/","name":"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg","datePublished":"2020-03-06T11:30:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/more-than-a-billion-hopelessly-vulnerable-android-gizmos-in-the-wild-that-no-longer-receive-security-updates-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates \u2013 research"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33718"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33718\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33719"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}