A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
The best way to protect business information on smartphones from cybercriminals is to leave that information off smartphones, according to a mobile security expert.
Most Popular Reviews
- 1 Apple iPhone 6 Plus: An in depth review
- 2 Motorola Moto G (2nd Gen.) android smartphone
- 3 HTC One Mini 2 android smartphone
- 4 Oppo Find 7 Android smartphone
- 5 Medion Akoya MD99410 (E1232T) touchscreen laptop
Best Deals on GoodGearGuide
Latest News Articles
- Conservative group says 2.4 million opposed to net neutrality rules
- Xen Project discloses serious vulnerability that impacts virtualized servers
- FCC takes steps to make room for 'white spaces,' wireless microphones
- Activists push Facebook to abandon its real-names policy
- ARM builds an OS for the Internet of Things
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.