Rooted Android devices pose major fraud and security risks. Learn how to detect them, why they’re dangerous, and how to protect your app and users.