ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

AirDroid Business is an unconventional Mobile Device Management Software that comes with powerful remote control and device monitoring tools like no other. It allows IT teams to seamlessly provision, manage, and secure their Android fleets in the enterprise network. How we’re different from other MDM solutions: * A cloud-based platform that can manage all Android-based endpoints and it’s easy to set up and enroll device without factory reset. * First in the MDM industry to develop and implement a proprietary remote control feature, Black Screen Mode, to ensure corporate privacy and smooth remote operations. * Allow businesses to deploy and manage its own APK in a private app library with zero-touch and rich rollout options for better user experience. * Offer everything needed from traditional device management to advanced security and policy control for organizations to streamline their business and IT operations in a well-secured manner. We have proven to help businesses and IT Service Providers (MSPs) across the globe to increase business mobility and productivity at a lower operational cost. AirDroid Business was proudly launched in 2018 by Sand Studio, a trusted company that has been dedicated in the mobile technology and innovation since 2011. We have been rapidly growing and evolving to accommodate the ever-changing technology and industry trends around the world. Try our 14-day free trial or visit www.airdroid.com/business today!

AirDroid Business A.I CyberSecurity Scoring

AirDroid Business

Company Details

Linkedin ID:

airdroidbusiness

Employees number:

84

Number of followers:

677

NAICS:

5112

Industry Type:

Software Development

Homepage:

airdroid.com

IP Addresses:

0

Company ID:

AIR_2854811

Scan Status:

In-progress

AI scoreAirDroid Business Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/airdroidbusiness.jpeg
AirDroid Business Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreAirDroid Business Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/airdroidbusiness.jpeg
AirDroid Business Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

AirDroid Business Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
AirDroid BusinessVulnerability10051/2016
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Millions of AirDroid,a device manager app users were left vulnerable to phone data hijacking attacks. Any attacker could exploit the vulnerability by sending the target a text message from a saved contact that is ‘inserted’ inside the AirDroid interface. Anyone could be targeted using innocent contact card (vCard) containing malicious code via any service (MMS/WhatsApp/email/etc.) with a phone number associated with the targeted account. However, in the end of January 2016, AirDroid released an update that contained a fix for the vulnerability.

AirDroid Business
Vulnerability
Severity: 100
Impact: 5
Seen: 1/2016
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: Millions of AirDroid,a device manager app users were left vulnerable to phone data hijacking attacks. Any attacker could exploit the vulnerability by sending the target a text message from a saved contact that is ‘inserted’ inside the AirDroid interface. Anyone could be targeted using innocent contact card (vCard) containing malicious code via any service (MMS/WhatsApp/email/etc.) with a phone number associated with the targeted account. However, in the end of January 2016, AirDroid released an update that contained a fix for the vulnerability.

Ailogo

AirDroid Business Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for AirDroid Business

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for AirDroid Business in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for AirDroid Business in 2025.

Incident Types AirDroid Business vs Software Development Industry Avg (This Year)

No incidents recorded for AirDroid Business in 2025.

Incident History — AirDroid Business (X = Date, Y = Severity)

AirDroid Business cyber incidents detection timeline including parent company and subsidiaries

AirDroid Business Company Subsidiaries

SubsidiaryImage

AirDroid Business is an unconventional Mobile Device Management Software that comes with powerful remote control and device monitoring tools like no other. It allows IT teams to seamlessly provision, manage, and secure their Android fleets in the enterprise network. How we’re different from other MDM solutions: * A cloud-based platform that can manage all Android-based endpoints and it’s easy to set up and enroll device without factory reset. * First in the MDM industry to develop and implement a proprietary remote control feature, Black Screen Mode, to ensure corporate privacy and smooth remote operations. * Allow businesses to deploy and manage its own APK in a private app library with zero-touch and rich rollout options for better user experience. * Offer everything needed from traditional device management to advanced security and policy control for organizations to streamline their business and IT operations in a well-secured manner. We have proven to help businesses and IT Service Providers (MSPs) across the globe to increase business mobility and productivity at a lower operational cost. AirDroid Business was proudly launched in 2018 by Sand Studio, a trusted company that has been dedicated in the mobile technology and innovation since 2011. We have been rapidly growing and evolving to accommodate the ever-changing technology and industry trends around the world. Try our 14-day free trial or visit www.airdroid.com/business today!

Loading...
similarCompanies

AirDroid Business Similar Companies

[24]7.ai

[24]7.ai™ customer engagement solutions use conversational artificial intelligence to understand customer intent, enabling companies to create personalized, predictive, and effortless customer experiences across all channels; attract and retain customers; boost agent productivity and satisfaction; a

Bosch USA

The Bosch Group’s strategic objective is to create solutions for a connected life. Bosch improves quality of life worldwide with innovative products and services that are "Invented for life"​ and spark enthusiasm. Podcast: http://bit.ly/beyondbosch Imprint: https://www.bosch.us/corporate-informatio

LinkedIn

Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode

HubSpot

HubSpot is a leading CRM platform that provides software and support to help businesses grow better. Our platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth. Today, thousands of customers around th

Microsoft

Every company has a mission. What's ours? To empower every person and every organization to achieve more. We believe technology can and should be a force for good and that meaningful innovation contributes to a brighter world in the future and today. Our culture doesn’t just encourage curiosity; it

IDEMIA

IDEMIA Group unlocks simpler and safer ways to pay, connect, access, identify, travel and protect public places. With its long-standing expertise in biometrics and cryptography, IDEMIA develops technologies of excellence with an impactful, ethical, and socially responsible approach. Every day, IDEMI

Cadence

Cadence is a market leader in AI and digital twins, pioneering the application of computational software to accelerate innovation in the engineering design of silicon to systems. Our design solutions, based on Cadence’s Intelligent System Design™ strategy, are essential for the world’s leading semic

Infor

As a global leader in business cloud software specialized by industry. Infor develops complete solutions for its focus industries, including industrial manufacturing, distribution, healthcare, food & beverage, automotive, aerospace & defense, hospitality, and high tech. Infor’s mission-critical ente

Amazon Fulfillment Technologies & Robotics

On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s

newsone

AirDroid Business CyberSecurity News

September 10, 2025 07:00 AM
AirDroid Parental Control App: How Good Does It Work? Let’s Find Out!

Find out if the AirDroid Parental Control app truly delivers on its promises for remote monitoring, location tracking, and ensuring your...

December 13, 2024 08:00 AM
I Tested the AirDroid Business Mobile Device Management Solution — Here’s What I Think

Discover the pros and cons of AirDroid Business MDM solution. Tested for you by a cybersecurity expert.

May 08, 2023 07:00 AM
AirDroid Business Integrates With Google Android Enterprise; Brings Enhanced Security and Ease of Deployment to Customers

AirDroid Business, the leading mobile device management (MDM) solution for Android devices, today announced the integration with Android...

August 09, 2022 07:00 AM
AirDroid Launches New Parental Control App for Android & iOS

The most reliable parental control app for every parents to protect children safe online & offline.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

AirDroid Business CyberSecurity History Information

Official Website of AirDroid Business

The official website of AirDroid Business is https://www.airdroid.com/business.

AirDroid Business’s AI-Generated Cybersecurity Score

According to Rankiteo, AirDroid Business’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does AirDroid Business’ have ?

According to Rankiteo, AirDroid Business currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does AirDroid Business have SOC 2 Type 1 certification ?

According to Rankiteo, AirDroid Business is not certified under SOC 2 Type 1.

Does AirDroid Business have SOC 2 Type 2 certification ?

According to Rankiteo, AirDroid Business does not hold a SOC 2 Type 2 certification.

Does AirDroid Business comply with GDPR ?

According to Rankiteo, AirDroid Business is not listed as GDPR compliant.

Does AirDroid Business have PCI DSS certification ?

According to Rankiteo, AirDroid Business does not currently maintain PCI DSS compliance.

Does AirDroid Business comply with HIPAA ?

According to Rankiteo, AirDroid Business is not compliant with HIPAA regulations.

Does AirDroid Business have ISO 27001 certification ?

According to Rankiteo,AirDroid Business is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of AirDroid Business

AirDroid Business operates primarily in the Software Development industry.

Number of Employees at AirDroid Business

AirDroid Business employs approximately 84 people worldwide.

Subsidiaries Owned by AirDroid Business

AirDroid Business presently has no subsidiaries across any sectors.

AirDroid Business’s LinkedIn Followers

AirDroid Business’s official LinkedIn profile has approximately 677 followers.

NAICS Classification of AirDroid Business

AirDroid Business is classified under the NAICS code 5112, which corresponds to Software Publishers.

AirDroid Business’s Presence on Crunchbase

No, AirDroid Business does not have a profile on Crunchbase.

AirDroid Business’s Presence on LinkedIn

Yes, AirDroid Business maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/airdroidbusiness.

Cybersecurity Incidents Involving AirDroid Business

As of December 06, 2025, Rankiteo reports that AirDroid Business has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

AirDroid Business has an estimated 27,318 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at AirDroid Business ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does AirDroid Business detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with released an update containing a fix for the vulnerability..

Incident Details

Can you provide details on each incident ?

Incident : Vulnerability Exploitation

Title: AirDroid Vulnerability Leading to Phone Data Hijacking

Description: Millions of AirDroid, a device manager app users were left vulnerable to phone data hijacking attacks. Any attacker could exploit the vulnerability by sending the target a text message from a saved contact that is ‘inserted’ inside the AirDroid interface. Anyone could be targeted using innocent contact card (vCard) containing malicious code via any service (MMS/WhatsApp/email/etc.) with a phone number associated with the targeted account.

Date Resolved: January 2016

Type: Vulnerability Exploitation

Attack Vector: Text message from a saved contactMalicious vCard

Vulnerability Exploited: Phone data hijacking via malicious vCard

Threat Actor: Unknown

Motivation: Data Theft

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Vulnerability Exploitation AIR121917522

Data Compromised: Phone data

Systems Affected: AirDroid app

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Phone data.

Which entities were affected by each incident ?

Incident : Vulnerability Exploitation AIR121917522

Entity Name: AirDroid

Entity Type: Company

Industry: Technology

Customers Affected: Millions

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Vulnerability Exploitation AIR121917522

Remediation Measures: Released an update containing a fix for the vulnerability

Data Breach Information

What type of data was compromised in each breach ?

Incident : Vulnerability Exploitation AIR121917522

Type of Data Compromised: Phone data

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Released an update containing a fix for the vulnerability.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unknown.

Incident Details

What was the most recent incident resolved ?

Most Recent Incident Resolved: The most recent incident resolved was on January 2016.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Phone data.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Phone data.

cve

Latest Global CVEs (Not Company-Specific)

Description

HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.4, some of HedgeDoc's OAuth2 endpoints for social login providers such as Google, GitHub, GitLab, Facebook or Dropbox lack CSRF protection, since they don't send a state parameter and verify the response using this parameter. This vulnerability is fixed in 1.10.4.

Risk Information
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Description

Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.

Risk Information
cvss4
Base: 9.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."

Risk Information
cvss2
Base: 5.1
Severity: HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:P
cvss3
Base: 5.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=airdroidbusiness' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge