The author of this article clearly did not read the ACM paper he links to! The author makes it seem like, if you have an android phone, your phone is now wide open to someone installing apps on it and exploiting it without your knowledge. Almost all of the exploits that ACM paper details...