airdroid100645505orig

AirDroid patches a contact card vulnerability that could let attackers steal your phone's data

AirDroid is the latest target in the never-ending battle against Android malware. The popular desktop-to-mobile syncing tool recently patched a phone data hijack and malicious code execution scheme, originally uncovered by security firm Check Point.

The attack works by sending a message with nefarious code hiding inside of a contact card (vCard). The attacker can then execute the code and steal data if the receiver opens the card accessed via AirDroid.

After Check Point alerted AirDroid to the issue, the AirDroid team pushed out version 3.2 of the its Android app, which repairs the breach. Along with ensuring that the desktop software is up to date, you should also check that you have the latest build of AirDroid from the Google Play Store.

Why this matters: Sometimes the danger is overblown, but the security situation on Android is worth paying attention to. Android’s open nature makes it susceptible to a number of attacks, although Google and other top OEMs have stepped up their game by offering monthly security updates. There’s no need to go back to pencil and paper, but it’s a good practice to be aware of the latest threats.

IDG Insider

PREVIOUS ARTICLE

« Bing picks Leonardo DiCaprio, The Revenant to win Oscars

NEXT ARTICLE

FCC vote could end the set-top box monopoly »
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

  • Mail

Recommended for You

20 Red-Hot, Pre-IPO companies to watch in 2019 B2B tech - Part 1

Martin Veitch's inside track on today’s tech trends

Training and certification for a cloud native world

Keri Allan looks at the latest trends and technologies

Unicorns are running free in the UK but Brexit poses a tough challenge

Trevor Clawson on the outlook for UK Tech startups

Poll

Do you think your smartphone is making you a workaholic?