An exploit published by a developer is easy to use and has already been used to build malicious apps that gain root access on Android devices. …read more

Source:: Threatpost