Malicious hackers have slapped a bull\u2019s-eye on the back of Android OS. Google\u2019s OS was the target of 75 percent of all mobile malware during Q1 2012, according to F-Secure.\n\tMost Android smartphone and tablet users probably know this. What they might not know, however, is whether their particular device is vulnerable. X-Ray, Duo Security\u2019s free app, aims to resolve that mystery.\n\tOnce installed, the app quickly scans your Android phone or tablet, checking to see if it\u2019s exposed to any of eight common Android OS vulnerabilities. The app is only available for downloading from X-Ray\u2019s download page, not from the Google Play Store market. This means that, ironically, you must allow your Android device to install apps from unknown, non-Google Play store sources\u2014which can put your device at risk if you\u2019re not careful.\n\tTo enable your device to install X-Ray, go to Settings \u2013 Applications and then check the box next to \u201cUnknown sources.\u201d After installing and running X-Ray, you might want to go back and uncheck that box.\n\tI ran X-Ray on both of my Android devices: the Samsung Galaxy Note, on which I have Android 2.3.6 installed, and Samsung\u2019s Galaxy Tab 8.9, which uses Android 3.2. X-Ray\u2019s scans detected that both devices were vulnerable to the Gingerbreak exploit.\n\tWhat is Gingerbreak, exactly? \u201cA commonly-abused vulnerability in the wild by Android malware, Gingerbreak affects the Android volume manager (vold) via, you guessed it, the same Netlink issue as Exploid,\u201d explains the X-Ray app, adding that \u201cbadness ensues.\u201d\n\tI doubt the average Android user will know what the heck that means. Let me translate: Gingerbreak is a vulnerability through which malware can be installed on your device without your knowledge. The Gingerbreak exploit gives bad guys complete access to a device\u2019s text messages, phone calls, data, and more.\n\tExample: Angry Birds Space, when downloaded from unofficial app stores and not Google\u2019s Play Store, has reportedly contained malicious files that, in essence, can give malicious hackers control over your device. These shenanigans are made possible because of a Trojan horse that uses the Gingerbreak exploit to install malicious code.\n\tSo now what? Unfortunately, X-Ray simply pulls the fire alarm; it doesn\u2019t put out the fire. Instead, it offers next-step suggestions, which may be helpful for some but, for less tech-savvy users, probably not so much. See the screen shot below for its instructions.\n\tOtherwise, take extra care not to download software outside the Google Play store. Read CIO.com senior editor Al Sacco\u2019s post \u201cAndroid Security: Six Tips to Protect Your Google Phone,\u201d which, though over a year old, still offers solid security advice.\n\tAnd be sure to install an anti-malware, antivirus security app. A study conducted by AV Test published in March 2012 found that avast! Mobile Security (free) was top-ranked Android security app.