How does Android “Fake ID” vulnerability compromise security and what can be done to prevent it?
The latest Android vulnerability has been called Fake ID, and as I understand it fools the OS by pretending to be a different app. How does it do that, and what can I do to prevent it?
Story added 30. July 2014, content source with full text you can find at link above.