A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
Latest News Articles
- Kogan enters wearables, fitness and health sectors with Fortis
- IoT inspires new components for energy, wireless
- Wolfram fortifies SystemModeler with more libraries
- State Department computer crash slows visa, passport applications worldwide
- Non-IBM Power8 servers, chips to appear early next year
Most Popular Articles
- 1 What does an NBN connection look like in a new home?
- 2 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 The most disturbing YouTube videos of all time
- 5 How to connect your iPhone to your TV
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $1001.95 free shipping
- $429 free shipping
- 16% off $499.95
- 34% off $847 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »