Up until Android 2.3, the OS was vulnerable to touch-event highjacking. This was accomplished when a false UI was placed over an applications true interface to trick users into clicking on ads, make purchases, install malicious apps, wipe phone data, or grant unwanted permissions. An example would be an application that on the surface may look like, say, a game where the user taps a “Start” button, while in reality that is a false layer overtop of a checkbox altering system settings.
In Android 2.3, the team at Google has implemented certain functions that will prevent apps from being vulnerable to touch-event highjacking. This is accomplished by allowing a layer to be interacted with only when it is the topmost visible layer. Developers will still need to take steps to protect their applications and users, but it isn’t much more than a few lines of code. Good on Lookout for, well, looking out for all Android users, not just those using their mobile apps. For more tech-y details and some of the developer nitty gritty, see the source link below.
[via Lookout]