Applications Exploiting Fake ID Vulnerability
If applications exploiting Fake ID vulnerability are detected on the device, they are displayed in the separate Security Auditor section. These applications can be malicious, therefore you are recommended to delete them. To delete the application, tap on the screen with the detailed information on the problem related to this application, or use standard OS tools. |