A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
The best way to protect business information on smartphones from cybercriminals is to leave that information off smartphones, according to a mobile security expert.
Latest News Articles
- Google has to face US privacy suit over new user data policy
- Apple hit with class action lawsuit for alleged labor rule violations
- Panasonic Lumix DMC-FZ1000 digital camera with 4K video shooting
- Seafaring robot shrugs off monster Typhoon Rammasun
- Zero-day flaws in Tails aren't for sale, vulnerability broker says
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »