The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
Most Popular Reviews
- 1 Samsung Galaxy Tab S: hands-on with Samsung's 2014 flagship tablet
- 2 Fetch TV set-top box
- 3 Dell Inspiron 15 5547 laptop
- 4 Samsung NX30 camera
- 5 ASUS T100 Transformer Book hybrid
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Latest News Articles
- Judge approves Apple e-books price-fixing settlement
- HP's SlateBook 14 Android laptop ships, but with a higher price than expected
- Train robots hands-on to dump trash with this new OS
- Oregon's move from Oracle-developed site to Healthcare.gov on track, official says
- Android vulnerability still a threat to many devices nearly two years later
Best Deals on GoodGearGuide
- Notebooks View all »
- $49.97 free shipping
- $17.81 free shipping
- $1299 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »