AirDroid patches a contact card vulnerability that could let attackers steal your phone’s data
AirDroid is the latest target in the never-ending battle against Android malware. The popular desktop-to-mobile syncing tool recently patched a phone data hijack and malicious code execution scheme, originally uncovered by security firm Check Point.
The attack works by sending a message with nefarious code hiding inside of a contact card (vCard). The attacker can then execute the code and steal data if the receiver opens the card accessed via AirDroid.