Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Malicious Android apps can impersonate trusted ones

Malicious Android apps can impersonate trusted ones

2014/07/30

Softpedia - (International) Researchers at Bluebox Security reported a vulnerability present in Android versions below 4.4 (KitKat) can allow malicious apps to benefit from the access permissions of legitimate apps due to signatures issued from a legitimate app not being checked.

Source: http://news.softpedia.com/news/Malicious-Android-Apps-Can-Impersonate-Trusted-Ones-452659.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:21:09