The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
Most Popular Reviews
- 1 Lenovo ThinkPad X1 Carbon Ultrabook (2015 model)
- 2 Synology DiskStation DS215j NAS device
- 3 Fitbit Charge wireless activity tracker
- 4 HP Stream 11 laptop
- 5 B&O BeoPlay A2 portable Bluetooth speaker
Best Deals on GoodGearGuide
Latest News Articles
- Google Now adds data from Lyft, Airbnb and many more apps
- Outlook app for Android and iOS boosts Microsoft's mobile comeback
- MIT randomizes tasks to speed massive multicore processors
- NEC aims at Big Data 'sweet spot' with new SAP Hana tool
- Uber will fight to keep its Boston ride data private
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.