To help keep Android and its kernel more secure, Google has announced a number of new mechanisms within Android. For memory protections, they will mark memory as read-only/no-execute, restrict kernel access to userspace, and improve protection against stack buffer overflows. For attack surface reductions, they will remove default access to debug features, restrict app access to IOCTL commands, and also require Seccomp-BMF.
Subscribe to:
Post Comments (Atom)
Featured Post
Hackers Exploiting ProxyLogon and ProxyShell Flaws in Spam Campaigns
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
Popular Posts
-
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
No comments:
Post a Comment