Most users here through various techniques ( sandboxing, SRP, disabling active content ) have little chance of being hit by malware unless either their whitelisting or sandboxing approach has an exploitable bug or a kernel level exploit is used.
Is there anything to be done to avoid kernel level exploits ? I’d expect no, for Linux there seem to be some modules that make it harder but of course no hard guarantees can be given by these modules
Is there anything to be done to avoid kernel level exploits ? I’d expect no, for Linux there seem to be some modules that make it harder but of course no hard guarantees can be given by these modules