A cryptography firm has identified over 400 security vulnerabilities in the Android operating system widely used in smart phones and tablets. They also identified data leaving Android devices going to various unknown destinations at a rate of about 80 to 90 times per hour. These security concerns are compounded by the fact that rogue cell phone towers (like malicious routers) can take control over devices. Popular Science reports, “Every smart phone has a secondary OS, which can be hijacked by high-tech hackers.”
Read more: “Mysterious Phony Cell Towers Could Be Intercepting Your Calls,” Popular Science 27 August 2014.