Problem
Suppose there is an android mobile device and that mobile phone user installed a third party app but after that his personal data from mobile phone was stolen and misused.
We have to identified the type of third party app (if possible mention any example), types of vulnerability in mobile devices , the type of vulnerability that application created in the mobile phone to steal data , What security vulnerabilities were identified in the mobile device?
1. How can the security vulnerabilities be secured?
2. How can these security vulnerabilities be exploited?
3. What are the threats to the security vulnerabilities identified?