Cyber security news for all


    Buffer overflow cyberattacks are one of the most common methods

    Buffer overflow attacks are one of the last and most common causes of code based vulnerabilities. Applications programmed are much more susceptible to controversial programming errors than software that uses other development languages. In order to solve these errors and thus buffer overflow attacks by criminal hackers, the developer community has developed a variety of secure development methods, which also belong to the large software players on the market as part of secure development life cycles.

    This is surprising in view of the long history of this attack technique and the corresponding efforts to finally get it done. However, MITER has updated the vulnerability ranking for the first time and put it on a new basis: The evaluation formula for the security holes now combines the frequency of security gaps in the national vulnerabilities database. The ranking therefore reflects the overall risk of certain vulnerabilities – based on their frequency and threat level. Another reason for the resumption of buffer overflow attacks could be the widespread use of IoT devices. In this regard, bad code quality and massive security failures have been criticized in recent years. The firmware of these embedded systems were accordingly frequently hit by buffer overflow attacks. However, hardly anything has changed – apart from the fact that more and more such devices are being used on the internet, business networks and private households.

    Buffer Overflow Attacks To Overwrite Critical Settings

    In certain cases, criminal hackers can also use buffer overflow attacks to overwrite critical settings within the application memory. This can result in an extension of rights at the application or even system level. Incorrect handling of the buffer limits can also enable attackers to read data outside the buffer instead of overwriting it. This practice is known as out of bounds. This method is also used by criminal hackers to spy on information about other possible attacks. Out of bounds are different from buffer overflow attacks, but they are made possible by the same programming errors.

    Recent Articles

    Hackers stole thousands of passport data in Argentina

    In response to millions of dollars ransom refused by the Argentine Immigration Service, a ransomware group released passport data from hundreds of thousands of...

    USA wants to improve cybersecurity of space systems

    CISA has published a table this week that summarizes Chinese activities against cybersecurity. Some attacks have succeeded and enabled hackers to gain a foothold...

    Unknown attackers had access to personal data of Warner Music

    Warner Music Group has admitted a security incident in which customers card details were stolen in some of the company's online stores. Warner Music...

    Donald Trump wants to force a sale of TikTok to Microsoft

    It was recently announced that President Donald Trump plans to prohibit business with the owners of TikTok by decree. The American head of state...

    PIN protection is cracked for contactless payments

    Contactless payments by card only works up to typically 30 dollars without a PIN. The PIN is actually  requested for high payments. This is...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox