New and Notable Android Vulnerability Found

— August 18, 2014

A free mobile app from Kaspersky Lab is meant to protect users against various Android vulnerabilities. The Kaspersky Fake ID Scanner scans smartphones and tablets for threats that put valuable data, privacy and even financials at risk.

Fake ID is one of the most notable new vulnerabilities—found by experts at Bluebox Labs—that enables attackers to disguise any app, including malicious, as legitimate programs developed by well-known vendors. Like the Master Key vulnerability, which enables cybercriminals to access any Android device with administrator privileges and launch software without the owner's knowledge, this presents high risks to users.

Preventive Measures
Although, as a rule, Google quickly closes such vulnerabilities, according to Kaspersky Labs, millions of Android users remain at risk—since it often takes device manufacturers a long time to update firmware.

Malware can use such vulnerabilities to make its way onto smartphones and tablets, often disguised as popular apps, in order to steal personal data stored on the devices, hijack user accounts on social networks, steal online banking credentials etc.

To prevent such vulnerabilities, the solution enables Android users to scan their devices for threats and safely determine that no applications that can exploit those vulnerabilities are installed on their mobile devices.

If any threats are detected, the tool prompts the user to install a free version of Kaspersky Internet Security for Android to remove the vulnerability. This will protect the device against malicious code regardless of the vulnerabilities exploited by the malware.

The app is compatible with Android 2.3 and later versions, and is available in Google Play.

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 0 (0 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

Who Owns Mobility

Less than one decade ago, smartphones and tablets changed workplace technology—virtually overnight. IT lost "control" and users became decision makers. Is it any wonder we are still trying to figure things out, and that the question of  "who owns mobility" remains? This research examines the current state of mobility in an attempt to answer that question.