Skip to main content

Android 4.4 KitKat Issues And Problems That You Should Know



Google has a lot of work to with several reported Android 4.4 KitKat bugs by various sources. In November, Google launched its Android 4.4 KitKat exclusive for its Nexus devices such as Nexus 4, Nexus 5, Nexus 7 and Nexus 10.

After it arrived to its users, several complaint reports were made regarding issues with the software. A significant number of users demanded for an Android 4.4.1 KitKat update for bug fixes. Unsurprisingly, Google rolled out the Android 4.4.1 KitKat update a few weeks after. The update was aimed toward fixing camera issues of the Nexus 5, which was believed the greatest flaw of the device.
Then Google released the Android 4.4.2 KitKat, another update, for security reasons. This is the latest version of Android KitKat.
Nexus owners are truly having problems with the Android 4.4 KitKat as Google Product Forums are pretty loud about it. Apart from that, other complaints abound like the one from a Reddit user named lazy_elf, who painstakingly compiled a list of Android 4.4 KitKat issues on his Nexus 4 device. About 27 issues were identified, some were quite minor while others were too massive to ignore. In response to the post, other users started to post their own issues with the Android 4.4 KitKat.
Other problems mentioned were poor battery life, poor connectivity, UI flaws, among others. Also, Android Police claimed another audio bug on the Android 4.4 KitKat. Users are crying for another Android 4.4.3 KitKat update to fix these issues.
Although Google has not confirmed some of the issues on the Nexus 5, a new version of Android 4.4.2 KitKat update has been spotted lurking on the Nexus 5. It is not yet clear whether or not this update will be released to the public.
Google is known for being unpredictable, thus, users suffering from issues and problems need to endure and wait for updates or look for temporary fixes at the time being.

Comments

Popular posts from this blog

Facebook Web Security Bug Bounty: Directory Traversal Vulnerability / RCE In Parse.com

http://parse.com   directory traversal vulnerability Little Insight: http://parse.com  was vulnerable to a directory traversal / RCE vulnerability. As a result, it was possible for an attacker to load web server-readable files from the local filesystem. or Run commend on That Well this is my 4th reward form facebook  Directory Traversal or RCE Vulnerability  That  give me 5th position in Facebook white-hat Page Report Date :23  July 2014 Reward For Directory Traversal or RCE Vulnerability :  20000$ How This work......? As we discussed earlier on my old post  Flowdock Directory Traversal Vulnerability exposed files outside of Rails’ view paths. '%5C' turns into '\' after decoding. Using Rack::Protection    it only rejects '/../' segments in the request path.   patch apply for Rack::Protection acording CVE-2014-0130  and  also Reject now '%5C' turns into '\' af...

HC WeB : A Browser for HACKERS...

A Browser for HACKERS... Try for Free... Download HC WeB Setup Gallery: Online Penetration Testing Tools Index Information Gathering Whois DNS Location Info Enumeration and Fingerprint Data Mining Search Engines Editors Online Text Editors Share Text Snippets Network Utilities Ping HTTP HTTPS VNC Remote Desktop SSH DNS Sniffers Misc Forensics Frameworks URL Cloaking E-mail Password Cracking Encoders and Decoders Encoders Decoders Malwares Malware Analysis Identify Malicious Websites Suspected Malicious IPs and URLs Application Auditing SQL Injection Cross Site Scripting File Inclusion Anonymity Proxy Others Hackery Open Penetration Testing Bookmarks Collection Hacker Media Blogs, Forums, Magazines and Videos. Methodologies Penetration testing frameworks, standards and methodologies. OSINT Presentations, People, Organizations and Infrastructure.  Exploits an...

Confirmed: Angry Birds website hacked by Anti-NSA Hacker

Syrian Electronic Army yesterday posted a tweet saying that one of its friend with handle "Anti-NSA" hacker defaced the Angry website. At the time, we were not able to confirm the defacement.  No one was reported to have seen the hack.  Even the Zone-h mirror didn't confirm the defacement, displayed a message "The mirror is onhold and has not been verified yet". So, we didn't have strong proof to report the hack.  Today,  Rovio, creator of angry birds, confirmed that the defacement was there for few minutes and corrected immediately.  Now, the Zone-h record also confirmed it. Antti Tikkanen, Director of Security Response at F-Secure Labs, said in twitter that the attack is actually 'DNS Hijack attack'. He mentioned that the website itself not touched by the hacker; hacker managed to modify the DNS records. He also said that the angrybirds website pointed to some IP address(31.170.165.141) assoicated with Lithuania for at least one hour.  The same ...