AirDroid patches a contact card vulnerability that could let attackers steal your phone’s data

AirDroid is the latest target in the never-ending battle against Android malware. The popular desktop-to-mobile syncing tool recently patched a phone data hijack and malicious code execution scheme, originally uncovered by security firm Check Point.

The attack works by sending a message with nefarious code hiding inside of a contact card (vCard). The attacker can then execute the code and steal data if the receiver opens the card accessed via AirDroid.

To read this article in full or to leave a comment, please click here

Read more: AirDroid patches a contact card vulnerability that could let attackers steal your phone’s data

Story added 18. February 2016, content source with full text you can find at link above.