Keyboard Vulnerability Scanner Application icon

Keyboard Vulnerability Scanner 1.0.1

1.6 MB / 5K+ Downloads / Rating 4.6 - 293 reviews


See previous versions

Keyboard Vulnerability Scanner, developed and published by Trustlook Mobile Security, has released its latest version, 1.0.1, on 2015-06-20. This app falls under the Tools category on the Google Play Store and has achieved over 5000 installs. It currently holds an overall rating of 4.6, based on 293 reviews.

Keyboard Vulnerability Scanner APK available on this page is compatible with all Android devices that meet the required specifications (Android 4.0+). It can also be installed on PC and Mac using an Android emulator such as Bluestacks, LDPlayer, and others.

Read More

App Screenshot

App Screenshot

App Details

Package name: com.trustlook.keyboardvulnerability

Updated: 10 years ago

Developer Name: Trustlook Mobile Security

Category: Tools

New features: Show more

App Permissions: Show more

Installation Instructions

This article outlines two straightforward methods for installing Keyboard Vulnerability Scanner on PC Windows and Mac.

Using BlueStacks

  1. Download the APK/XAPK file from this page.
  2. Install BlueStacks by visiting http://bluestacks.com.
  3. Open the APK/XAPK file by double-clicking it. This action will launch BlueStacks and begin the application's installation. If the APK file does not automatically open with BlueStacks, right-click on it and select 'Open with...', then navigate to BlueStacks. Alternatively, you can drag-and-drop the APK file onto the BlueStacks home screen.
  4. Wait a few seconds for the installation to complete. Once done, the installed app will appear on the BlueStacks home screen. Click its icon to start using the application.

Using LDPlayer

  1. Download and install LDPlayer from https://www.ldplayer.net.
  2. Drag the APK/XAPK file directly into LDPlayer.

If you have any questions, please don't hesitate to contact us.

App Rating

4.6
Total 293 reviews

Reviews

5 ★, on 2015-09-29
People keep their lives, their secrets on their phones. Even though this exploit is very difficult there's always a chance. If you're affected by it call Samsung and complain. A fix should have been made available by now. Maybe a good class action is what we need

5 ★, on 2015-08-14
Just an app to scan for keyboard vulnerability. It worked as described and I am glad. Good Job! Could you guys come up with a solution for those that are infected.

2 ★, on 2017-09-23
Totally doesn't detect Samsung Keyboard and Push infection on Galaxy J7.... there's basically root control of OS which has been replaced with malicious OS... won't allow System Security Update, most device settings are inoperable, multiple phone icons (3-15) in app tray that cannot be disabled or stopped and defaults are corrupted... surfaceflinger is related to OS takeover...bad security certificates installed, Samsung keyboard keeps taking over input method with frozen Multiple Language setting where hack originated from thru language updates that can't be stopped and of course all user info is hacked or will be ultimately...can't even run a VPN without being corrupted by hack... screen overlays are kinda sloppy and fraudulent system icons and their battery use assigned names are a joke.... unfortunately this detector fell to the corrupt OS info and thinks all is well with my Galaxy J7 impersonated OS system.... it's completely taken over so this app isn't reliable detection... hopefully nothing worse.

5 ★, on 2017-01-05
You just never know. I've got an HTC One M9. Running Android 6.0. My keyboard is fine but others are bound to be infected. This app will tell you

3 ★, on 2015-12-08
OK to notify, however to date no resolution. Thus taking up space. I can monitor from here without the app!

3 ★, on 2015-09-24
Hasn't really done anything but tell me that I have a possible problem with no Solutions, app THE info though.

Previous Versions

Keyboard Vulnerability Scanner 1.0.1
2015-06-20 / 1.6 MB / Android 4.0+

About this app

What kind of security risk does this app scanning?
On Jun 16, a critical security vulnerability has been published (CVE-2015-2865), which impacts multiple Galaxy modules including the newly released S6. This vulnerability allows an attacker to install and execute arbitrary apps with the system privilege, exposed over 600 million phone users into a significant risk.

What is the consequence of this vulnerability?
When successfully exploited, an attacker could remotely:
►Access sensors and resources like GPS, camera and microphone
►Secretly install malicious app(s) without the user knowing
►Tamper with how other apps work or how the phone works
►Eavesdrop on incoming/outgoing messages or voice calls
►Attempt to access sensitive personal data like pictures and text messages
…and everything else a system user can do.

I’m impacted by this vulnerability, now what?
Avoid connecting to an insecure wi-fi network, and keep an eye on the official patch information. We will notify you in this app when the patch is available.

[Technical] How is this vulnerability caused?
The vulnerability (CVE-2015-2865) is caused by the insecure implementation of system upgrading mechanism. When checking the system update and downloading the update package, used an insecure HTTP connection. If an attacker gains control of a network - via a ARP MitM attack or compromised router, he could replace the update package to a malicious app, and have it executed as a privileged (system) user.


Ⓕ Facebook https://www.facebook.com/Trustlook
Ⓣ Twitter https://twitter.com/trustlook
Ⓖ Website http://www.trustlook.com

New features

.Scan more devices

App Permissions

Allows applications to open network sockets.