Android Police

Articles Tagged:

exploit

...

Google Patches GingerBreak Exploit, But Don't Worry - We Still Have Root (For Now)

Well, that was fast. It hasn't been very long since the vold exploit was found that allowed root access to Gingerbread and Honeycomb systems, but Google has already patched it and moved the fix into the AOSP code (see these commits: [1], [2], [3], [4]). This means that once this update is pushed, we will need to find another route to achieve root access on devices running Gingerbread and Honeycomb.

Read More
...

Skype App For Android Updated To 1.0.0.983, Fixes Personal Info Vulnerability And Adds 3G Calling In The U.S.

Skype released an update to its Android app this morning, remedying the vulnerability which exposed tons of personal info that we revealed last week. Our own Justin Case who originally found the issue has taken a look at the updated version of the app and confirmed that the exploit he developed to demonstrate the vulnerability no longer functions.

Specifically, Skype has changed the permissions of the databases (which contain the personal information) in question.

Read More
...

[Updated] Exclusive: Vulnerability In Skype For Android Is Exposing Your Name, Phone Number, Chat Logs, And A Lot More

Update #1: Skype is investigating the issue, we've been told.

Update #2: Skype's official first response can be found here.

The safety of our personal information is often a concern of mine - who has my email address, my phone number, my date of birth? How can I keep my private information safe while still enjoying the internet? These concerns have prompted me to take a deeper look at Android apps more than once, and often this can yield some frightening information.

Read More
...

Critical Vulnerability Found In Adobe Flash For Android, Probably No Cause For Concern

With a great plugin comes great responsibility - to avoid malicious Flash files, that is. A zero-day exploit has been discovered in Adobe Flash that affects all Android versions of the software, Adobe announced today.

The most common vessel for the exploit is (fortunately) a Microsoft document (.doc) email attachment with an embedded Flash file (.swf) - and I'm not aware of any Word document viewers/editors in Android that support embedded Flash.

Read More
Page 4 of 41234