Exploit mitigations – Android

In recent years with the entry of open source OS for mobile phones, mobile phone makers and users have lot of choices. Users started to move to mobile phones for their daily task. Phone makers are pushed to provide similar security options to its users. You will see many of the exploit mitigations are implemented in the mobile platform too. You can read about exploit mitigations in Android 4.1 in this link.

https://blog.duosecurity.com/2012/07/exploit-mitigations-in-android-jelly-bean-4-1/

Advertisements
This entry was posted in Exploit Mitigation and tagged , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s