The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
Most Popular Reviews
- 1 Sony Xperia Z3 review: The no-frills flagship
- 2 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 3 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 4 Aldi's $279 Bauhn Sphere review: Disappointing
- 5 Nokia Lumia 735 review: Perfectly ordinary
Best Deals on GoodGearGuide
Latest News Articles
- Study: E-readers, tablets can disrupt sleep
- Google's prototype car ready, but it's more VW Beetle than Porsche
- Hotel group asks FCC for permission to block some outside Wi-Fi
- North Korean Internet connection hit by outages
- DirecTV won't show 'The Interview,' others won't say
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.