Google patches flaw in Android Kernel Security

Google patches flaw in Android Kernel Security

Achieving command over Android devices used to be very easy for attackers. This is about to change.

By exploiting memory corruption bugs by, for example, buffer overflows, type confusion or integer overflows, hackers have been able to reuse codes which allow them to achieve arbitrary code executions. In other words: hackers could easily make your phone do things you did not want it to do and show them data you probably do not want them to see.

To prevent this, Google has now patched the vulnerability by adding support for LLVM’s Control Flow Integrity (CFI) to Android’s kernel.

To read more about this click here.

Copyright Lyonsdown Limited 2021

Top Articles

Data of 500m LinkedIn users put up for sale on the Dark Web

Detailed personal and professional information associated with 500 million LinkedIn profiles has been put up for sale on a popular dark web forum.

Several EU bodies suffered cyber attacks in March, EU reveals

A number of European Union institutions, including the European Commission, were the targets of cyber attacks in March.

The rise and rise of nation state cyber attacks

There has been a 100% rise in nation state cyber attacks over the last three years with attacks aimed at organizations with high value IP, such as technology and pharmaceutical…

Related Articles