Thank you so much O guess I don't need this one. I need one for 7.0 if you could help at all, I have 7.0 and I have a hacker that gets on and starts controlling my phone. I need help. He starts messing with so many things on my device like settings, Google policies, you name it, it's been done ugh. Anyway thank you so much :-) 5 stars.
Running Android 5.0.2 and I have the vulneability... contrary to what articles say; that I should not be affected due to my OS version, my phone can still be infected. I think this app is a joke. UPDATE 3/30/15: after developer update, I tried again and my phone (Nexus 6 now with Android 5.1) would not allow the dummy app to install, so it appears my phone is now safe from any vulnerabilities. I now rate 5 star and thank developer for fixing the app.
Slightly inconsistent It first said android 5.1 on my nexus 5 had the vulnerability after the March 26th update then ran the test again and it said I was safe so which is it, am I safe or not also I may point out that my nexus 5 is rooted
Not worth it At first I did the test and the result was my device had the vulnerability. After the press of a few more buttons I ran the test and my device was safe. I simply scanned twice, I didn't enable any protection
bad news android took 4 parse error attempts on 4.4.4 to install replacement app and said vulnerable. tried older JB and ICS phones instantly installed replacement app and reported being vulnerable. I use xprivacy and droidwall so even if I do get snared the app still wouldnt get to use switched permissions without knowing. - - - - - reading the comments from others that are just so clueless and can't read the description information or understand the instructions should only use Google play because no app fixes ignorance.
I dont understand How i use this app. How it work plz suggest me early
Fixed bugs when running on some Android devices. * Please enable the "Unknown Sources" setting before start scanning. * If there is still 'Parse Error' message, please restart the app and try again.