Now why would Google give away the Android operating system to so many manufacturers who would then "profit" from the "gift" ?
Could it be, an oversight allowed for millions of phones to at the simple sending of a TEXT MESSAGE to the phone number allow it to be turned into an "android drone" supplying the phone's data, live video and audio to the "hacker" (read spy).. or?
(http://www.bloomberg.com/bw/articles...-all-the-money)
The Spy's best Friend - ANDROID
http://www.npr.org/sections/alltechc...th-just-a-text
In this attack, the target would not need to goof up — open an attachment or download a file that's corrupt. The malicious code would take over instantly, the moment you receive a text message.Android is the most popular mobile operating system on Earth: About 80 percent of smartphones run on it. And, according to mobile security experts at the firm Zimperium, there's a gaping hole in the software — one that would let hackers break into someone's phone and take over, just by knowing the phone's number.
"This happens even before the sound that you've received a message has even occurred," says Joshua Drake, security researcher with Zimperium and co-author of Android Hacker's Handbook. "That's what makes it so dangerous. [It] could be absolutely silent. You may not even see anything."
Here's how the attack would work: The bad guy creates a short video, hides the malware inside it and texts it to your number. As soon as it's received by the phone, Drake says, "it does its initial processing, which triggers the vulnerability."
The messaging app Hangouts instantly processes videos, to keep them ready in the phone's gallery. That way the user doesn't have to waste time looking. But, Drake says, this setup invites the malware right in.
According to security firm F-Secure, 99 percent of mobile malware threats in the first quarter of 2014 were designed to run on Android devices.NPR has asked leading phone makers and wireless service providers whether they'll fix the bug. We're waiting for responses and will post them to this page.