Norton Halt exploit defender 5.3.0.148 Apk
Rate saved, Thank!
4.3 (1 votes)
Description of Norton Halt exploit defender
Norton Halt is a first responder app, designed to alert you on the latest breaking security vulnerabilities and exploits that threaten your device and personal information by allowing attackers to bypass system permissions, inject malicious code, and install unauthorized apps.
FEATURES
• Detects the Lock Screen Bypass vulnerability
• Detects the Serialization vulnerability
• Checks your device for the Stagefright vulnerability
• Checks for browsers that are vulnerable to Same Origin Policy Security Bypass
• Scans for apps that use vulnerable versions of the Apache Cordova toolkit
• Lets you know whether your device has the Fake ID vulnerability
• Scans your phone to detect MasterKey vulnerability and the Obad Trojan virus
• Prevents multiple lock screen bypass exploits
• Detects Exynos 4 exploit and USSD code attacks
• Blocks unauthorized USSD code requests and stops the dialer from executing USSD codes
• Updated periodically to help protect against threats and vulnerabilities that can expose personal data and financial information.
LOCK SCREEN BYPASS VULNERABILITY (CVE-2015-3860)
The Lock Screen Bypass vulnerability allows anybody with physical access to the device to potentially unlock it without knowing the correct password.
SERIALIZATION VULNERABLITY (CVE-2015-3825)
The Serialization vulnerability allows attackers to execute arbitrary code with escalated privileges, enabling them to take over the device. This is due to a flawed OpenSSLX509Certificate implementation in the Android operating system.
STAGEFRIGHT VULNERABILITY (CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, CVE-2015-3829)
A remotely exploitable software defect that affects the Android operating system, it allows an attacker to perform arbitrary operations on the victim device through remote code execution and privilege elevation.
ANDROID BROWSER SAME ORIGIN POLICY SECURITY BYPASS VULNERABILITY
The issue allows an attacker to bypass the same origin policy in the Android Open Source Project (AOSP) browser by convincing a user to visit a malicious website. Once the bug is exploited, the attacker could view any Web page open on other windows on the AOSP browser.
APACHE CORDOVA VULNERABILITY
Apache Cordova is a widely used toolkit that allows developers to build apps using HTML, CSS, and JavaScript. Many Android apps, especially banking apps, are open to attack due to a vulnerability in the Apache Cordova platform. This vulnerability can be used to remotely extract user’s information, including login credentials. Later versions of the Apache Cordova patches the bugs.
FAKE ID VULNERABILITY
Fake ID is a vulnerability in the Android OS that allows malicious apps to break out of a key security sandbox and gain access to parts of the Android OS that are usually out of bounds to most apps. These apps “fake” certain Android credentials to gain access other apps on the device and steal users’ personal information (passwords, financial information, etc.).
MASTER KEY EXPLOIT
MasterKey malware hijacks installed apps to turn them in to malicious Trojans that can access personal information on the device. Infected devices can be used to steal user data or to create a mobile botnet.
LOCK SCREEN BYPASS EXPLOIT
Variations of this exploit allows attackers to gain full access to your device by bypassing the PIN/password/pattern lock screen.
OBAD EXPLOIT
The Obad exploit injects malicious code into existing apps, to extend the app’s permissions and steal your personal information, usually sending the data via SMS.
USSD EXPLOIT
The USSD codes exploit has the potential to initiate a complete wipe of data on your phone and SIM card.
--------------------------------------------------
PRIVACY POLICY
Symantec respects your privacy and promises to carefully safeguard your personal data.
For more information: http://www.norton.com/mobile-privacy-policy