The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
Most Popular Reviews
- 1 Medion Akoya E4110 (MD 8239) desktop PC
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 Kogan Agora 4G review
- 4 Motorola Moto E review
- 5 OnePlus One: An Australian review
Best Deals on GoodGearGuide
Latest News Articles
- Report: Amazon building ad system to compete with Google's
- Airbnb to reveal 124 New York hosts to attorney general
- US warns 'significant number' of major businesses hit by Backoff malware
- HP loses its leader on NFV, a key carrier network trend
- Google acquires Gecko Design for next-generation products
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTChief Information OfficerNSW
- FTSearch Account ManagerNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTAccount Manager Programmatic Trading DeskNSW
- FTMarketing Communications Executive - B2BNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTInformation Services ManagerNZ