As per the some popular Security Research lab, a variety of Android system vulnerabilities that threatened users in June. Hackers can take advantage of these flaws and thus the malware infections prevent users from using their phone normally and these liabilities are incredibly widespread and affecting a significant amount of Android users worldwide. Be Aware! The biggest vulnerability flaws in your Android OS are
Generally, Android phones need the user's permission before they can make the call. In July "Phone (com.android.phone)" was released and this vulnerability allows malware to initiate or end a call, or even make calls to premium rate phone numbers without first gaining the permission of the user. Hackers can easily use this bug to dial a particular number so that they can interfere with normal calls, lock the SIM Card, delete the data on your phone, and so on.
By using the cloning, hackers can intercept the electronic serial number (ESN) and mobile identification number (MIN) and program these numbers into another phone to make it identical to your phone.
Android users should be aware of that the data available on their phones such as photos, messages, call records, history and other info can still be recovered or viewable by malicious users. If you are selling or even just throwing your old cell phone, it was observed that there are no precautions taken by the users. This weak point can affect almost all Android phones and because of that hackers can easily carve out the any personal information by using simple data recovery tools.
Hackers can create a malicious app that imitates trusted Android system apps such as Adobe Flash Plug-in, 3LM, and so on, and when users will use these apps, these malicious applications will then operate stealthily on user's mobile. Using this malicious application cyber criminal can secretly steal account numbers, passwords and other private information.
Android phones can be turned into a microphone and transmitter for listening to the conversations in the vicinity of the phone. This can happen by transmitting a maintenance command on the control channel to the cell phone. This command places the cell phone in the "diagnostic mode" and after that conversations in the immediate area of the telephone can be monitored over the voice channel. The user does not know that the telephone is in diagnostic mode and their conversation is being recorded by hackers.
Mobile data vulnerability occurs for a number of reasons, including poor security practices and procedures, inadequate training for individuals responsible for network security, or software products of poor quality provide the entry gate for attackers. One of the research shows the statistical data of an alarming increase in susceptibility mobile data. Using the serious code security audits and exploit mitigations by the major baseband chip, vendors can go a long way toward reducing this type of security problems.