X-Ray, Duo Securitys free app, sets off Android security fire alarms but doesn't put out the fire. For that you'll need to arm yourself. Here are some suggestions. Malicious hackers have slapped a bull’s-eye on the back of Android OS. Google’s OS was the target of 75 percent of all mobile malware during Q1 2012, according to F-Secure. Most Android smartphone and tablet users probably know this. What they might not know, however, is whether their particular device is vulnerable. X-Ray, Duo Security’s free app, aims to resolve that mystery. Once installed, the app quickly scans your Android phone or tablet, checking to see if it’s exposed to any of eight common Android OS vulnerabilities. The app is only available for downloading from X-Ray’s download page, not from the Google Play Store market. This means that, ironically, you must allow your Android device to install apps from unknown, non-Google Play store sources—which can put your device at risk if you’re not careful. To enable your device to install X-Ray, go to Settings – Applications and then check the box next to “Unknown sources.” After installing and running X-Ray, you might want to go back and uncheck that box. I ran X-Ray on both of my Android devices: the Samsung Galaxy Note, on which I have Android 2.3.6 installed, and Samsung’s Galaxy Tab 8.9, which uses Android 3.2. X-Ray’s scans detected that both devices were vulnerable to the Gingerbreak exploit. What is Gingerbreak, exactly? “A commonly-abused vulnerability in the wild by Android malware, Gingerbreak affects the Android volume manager (vold) via, you guessed it, the same Netlink issue as Exploid,” explains the X-Ray app, adding that “badness ensues.” I doubt the average Android user will know what the heck that means. Let me translate: Gingerbreak is a vulnerability through which malware can be installed on your device without your knowledge. The Gingerbreak exploit gives bad guys complete access to a device’s text messages, phone calls, data, and more. Example: Angry Birds Space, when downloaded from unofficial app stores and not Google’s Play Store, has reportedly contained malicious files that, in essence, can give malicious hackers control over your device. These shenanigans are made possible because of a Trojan horse that uses the Gingerbreak exploit to install malicious code. So now what? Unfortunately, X-Ray simply pulls the fire alarm; it doesn’t put out the fire. Instead, it offers next-step suggestions, which may be helpful for some but, for less tech-savvy users, probably not so much. See the screen shot below for its instructions. Otherwise, take extra care not to download software outside the Google Play store. Read CIO.com senior editor Al Sacco’s post “Android Security: Six Tips to Protect Your Google Phone,” which, though over a year old, still offers solid security advice. And be sure to install an anti-malware, antivirus security app. A study conducted by AV Test published in March 2012 found that avast! Mobile Security (free) was top-ranked Android security app. Related content feature 4 remedies to avoid cloud app migration headaches The compelling benefits of using proprietary cloud-native services come at a price: vendor lock-in. Here are ways CIOs can effectively plan without getting stuck. By Robert Mitchell Nov 29, 2023 9 mins CIO CIO CIO case study Steps Gerresheimer takes to transform its IT CIO Zafer Nalbant explains what the medical packaging manufacturer does to modernize its IT through AI, automation, and hybrid cloud. By Jens Dose Nov 29, 2023 6 mins CIO SAP ServiceNow feature Per Scholas redefines IT hiring by diversifying the IT talent pipeline What started as a technology reclamation nonprofit has since transformed into a robust, tuition-free training program that seeks to redefine how companies fill tech skills gaps with rising talent. By Sarah K. White Nov 29, 2023 11 mins Diversity and Inclusion Hiring news Saudi Arabia will host the World Expo 2030 in Riyadh By Andrea Benito Nov 28, 2023 4 mins Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe