Contents
Applications Exploiting Fake ID Vulnerability

Applications Exploiting Fake ID Vulnerability

If applications exploiting Fake ID vulnerability are detected on the device, they are displayed in the separate Security Auditor section. These applications can be malicious, therefore you are recommended to delete them. To delete the application, tap Delete on the screen with the detailed information on the problem related to this application, or use standard OS tools.

Previous  Next