Trustlook Releases Detection Solutions for High-Risk Android Remote Code Execution Vulnerability within 12 Hours

September 9, 2013

Trustlook releases a dynamic detection solution for the Android WebView AddJavascriptInterface Remote Code Execution vulnerability within only 12 hours.

San Francisco, CA (PRWEB) September 09, 2013

Trustlook, Inc., providers of innovative next-generation mobile security solutions for the enterprise industry, announced today that within twelve hours of the malware’s initial report, the company has released a dynamic detection solution for the Android WebView AddJavascriptInterface Remote Code Execution vulnerability which has impacted several browser and media player applications, significantly affecting more than 10 million users. The solution Trustlook provided will help enterprise users of Android devices to identify and filter out high-risk vulnerable apps before hackers can exploit them remotely. In case this vulnerability is exploited, attackers can execute arbitrary code in a user’s mobile device.

After wooyuan.org, a vulnerability report platform based in China released a report on how to exploit this vulnerability; the Trustlook team immediately published a blog on their website to alert enterprise users of this high-risk vulnerability. Within 12 hours, the Trustlook team released an updated version of its cloud sandbox to detect applications affected by this vulnerability. To date, Trustlook has identified at least 10 high-risk Android applications, likely allowing hackers to exploit the vulnerability in order to gain full control of a user’s device remotely.

“Mobile devices have become such an essential part of millions of people who can easily run into many threats and risks from malware. We are confident that our continuously advancing APT (Advance Persistent Threat) will provide a safe environment for Android device users,” said Allan Zhang, founder and CEO of Trustlook. He adds, “As threats emerge, becoming more prevalent and persistent, we at Trustlook are committed to providing the fastest and most innovative solutions for our customers.”

The company will be exhibiting for one day at TechCrunch’s DISRUPT 2013 in San Francisco at The Concourse Exhibition Center on September 10, 2013. Trustlook, Inc. invites everyone to see their latest security demo at their booth in the Startup Alley area.

Trustlook, Inc. is one of the hottest companies in Hanhai Investment z-Park tech incubator in San Jose, CA.

About Trustlook, Inc.

Trustlook pioneers and provides the first APT (advanced persistent threat) mobile security solutions to detect and address zero-day and advanced malware. Founded in July, 2013, Trustlook is the emerging leader in next-generation mobile security solutions. The company was founded by Allan Zhang, and backed by industry’s leading experts in the security industry. For more information, please visit http://www.trustlook.com.

About Hanhai Investments z-Park

Hanhai Investments z-Park is a Silicon Valley incubator founded in June 2012, geared for early stage or growth stage high-tech startups. Nicknamed as Hanhai z-Park, the incubator is the largest and busiest startup hub in the valley, housing over 80 companies today. Hanhai z-Park provides total business support from office space, administrative, operational and professional services, including legal, accounting/financial and marketing. The incubator also offers mentorship and startup guidance with its Startup University. Hanhai Investment is also a founding partner of zPark Venture, a cross-border venture funding group, focusing on early stage startups in mobile, game, internet, security, big data and healthcare IT, etc. A handful of Hanhai z-Park’s startups have been funded by zPark Venture. For more information, please visit http://www.hanhaiinvestment.com.


Media Contacts:

Jing Sun

PR for Trustlook


Email: pr(at)trustlook(dot)com

Twitter: @apkjet

Facebook: https://www.facebook.com/Trustlook


Elizabeth Estrella-Basilio

PR for Hanhai Investments z-Park

Cross Border Communications



Twitter: @lizestrellab


For the original version on PRWeb visit: http://www.prweb.com/releases/Trustlook/AtDISRUPT/prweb11102296.htm

Source: prweb

comments powered by Disqus