A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
The best way to protect business information on smartphones from cybercriminals is to leave that information off smartphones, according to a mobile security expert.
Latest News Articles
- In a hyper-social world, some seek a little privacy
- Facebook app gives free Internet to mobile users in Zambia
- Sony profit leaps on PlayStation 4 strength
- China's Xiaomi rises to fifth place in smartphone rankings
- No patch yet for zero day in Symantec Endpoint Protection software driver
Most Popular Articles
- 1 Buying guide: Ovens, cooktops and freestanding cookers (upright ranges)
- 2 The most disturbing YouTube videos of all time
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 How to connect your iPhone to your TV
- 5 How to pick the right size TV for your living room
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $34.95 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »