The current approach to addressing such security issues is disjointed at best.

“Google does not vet the applications in its app store like Apple does,” he added.

“So all Android users must be vigilant when downloading apps from the store.”

Hacker using phone in the dark

xijian / Getty Images

For instance, some apps may ask for permissions to the camera or contacts.

“Malicious apps usually ask for root-level permissions, meaning it has complete control over your gear.”

But Kulkarni says theres only so much users can do about an obscure issue like the Qualcomm vulnerability.

Hacker with smartphone and computers in dark room

boonchai wedmakawand / Getty Images

It’s extremely important for organizations to kill the vulnerability window.

“Their only choice is to upgrade the equipment,” Kulkarni said.