Ginger Software makes an app that can detect cancer and protect people’s privacy

Ginger Software, a maker of security software for smartphones, said it will make an app for Android phones that can scan a person’s health records and warn about health risks if they’re using the app, according to a report.

The startup’s founders said the new tool will allow people to keep track of their health and safety while on the go and prevent them from becoming a target for hackers.

The app, Ginger Safe, will be available as an in-app purchase for Android users starting in January, according a blog post from Ginger Software CEO Chris Johnson.

The company plans to release the app to its millions of users in the first half of next year, the blog post said.

The feature comes after security experts warned earlier this year that the company’s app could have been hacked and infected with malware.

The app has been downloaded more than 2 million times on the Play Store.

Ginger Software’s app is available in the Google Play store, as well as in the Apple App Store, Amazon App Store and Microsoft’s App Store.

The news comes as cybersecurity experts warn that Android users are vulnerable to attacks by cybercriminals using the software to spread malware.

Earlier this year, a group called the Shadow Brokers released a series of files it said was an NSA-crafted trojan that was meant to infect Android devices with a “Trojan Horse” version of a malicious program called Android Spy.

The group claimed to have gained access to a copy of Android Spy, which it claimed was “a backdoor to Android devices.”

The Shadow Broker group said the software, which is designed to be undetectable on Android devices, would allow hackers to gain access to user devices and compromise their passwords, as long as they’re in the same country as the device.

The Shadow Bros. said the backdoor allowed attackers to compromise a number of Android devices in June and July, including a Google Nexus 6, a Samsung Galaxy S6, a Motorola Moto X, an Asus Transformer Prime and a Dell XPS 13.

The groups claims to have used a combination of malicious code, the Shadow Bros.’s own exploits, and malware to access Android devices.

The Shadow Bros said they had targeted the Galaxy S7, Galaxy S8, Galaxy Note 7, Pixel C and Pixel C XL, but said that some of the targeted devices also included the Pixel C, Nexus 6 and the Pixel, which could have provided the same type of access.