Google patches flaw in Android Kernel Security

Google patches flaw in Android Kernel Security

Achieving command over Android devices used to be very easy for attackers. This is about to change.

By exploiting memory corruption bugs by, for example, buffer overflows, type confusion or integer overflows, hackers have been able to reuse codes which allow them to achieve arbitrary code executions. In other words: hackers could easily make your phone do things you did not want it to do and show them data you probably do not want them to see.

To prevent this, Google has now patched the vulnerability by adding support for LLVM’s Control Flow Integrity (CFI) to Android’s kernel.

To read more about this click here.

Copyright Lyonsdown Limited 2020

Top Articles

PrismHR outage possibly caused by a ransomware attack, experts believe

PrismHR suffered a cyber attack last week which forced it to shut down its flagship software that serves thousands of organisations worldwide.

Hackers exploited flaws in Accellion FTA to steal data from Qualys

Qualys said hackers exploited a zero day vulnerability in Accellion's FTA to infiltrate an FTA server deployed in its DMZ environment.

SITA data breach compromised data associated with multiple international airlines

SIT, has revealed it recently suffered a major cyber attack that compromised information belonging to customers of several airline companies.

Related Articles