The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 TomTom Runner Cardio GPS watch
- 4 LG G3 review
- 5 Nokia Lumia 930 review
Best Deals on GoodGearGuide
Latest News Articles
- Optus launches carrier aggregated LTE on 2300MHz spectrum
- Broken iPhone 6 screens, faulty batteries an easier fix
- Lyft acquires ride-sharing startup Hitch
- 10 million and counting as Apple smashes iPhone sales record
- Microsoft brings Nokia Lumia 735 to Australia for sub-$400
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.