Several of the most popular antivirus products contain vulnerabilities that can be exploited locally or remotely, a security researcher revealed at the SyScan 360 security conference in Beijing earlier this month.
In this podcast, Chief Technology Officer at Bluebox Security Jeff Forristal, discusses a significant Android vulnerability that lets hackers create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app.
A serious vulnerability exists in the Android operating system, which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet. Essentially anything that relies on verified signature chains of an Android application is undermined.
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.