Cyber security news for all

More

    Buffer overflow cyberattacks are one of the most common methods

    Buffer overflow attacks are one of the last and most common causes of code based vulnerabilities. Applications programmed are much more susceptible to controversial programming errors than software that uses other development languages. In order to solve these errors and thus buffer overflow attacks by criminal hackers, the developer community has developed a variety of secure development methods, which also belong to the large software players on the market as part of secure development life cycles.

    This is surprising in view of the long history of this attack technique and the corresponding efforts to finally get it done. However, MITER has updated the vulnerability ranking for the first time and put it on a new basis: The evaluation formula for the security holes now combines the frequency of security gaps in the national vulnerabilities database. The ranking therefore reflects the overall risk of certain vulnerabilities – based on their frequency and threat level. Another reason for the resumption of buffer overflow attacks could be the widespread use of IoT devices. In this regard, bad code quality and massive security failures have been criticized in recent years. The firmware of these embedded systems were accordingly frequently hit by buffer overflow attacks. However, hardly anything has changed – apart from the fact that more and more such devices are being used on the internet, business networks and private households.

    Buffer Overflow Attacks To Overwrite Critical Settings

    In certain cases, criminal hackers can also use buffer overflow attacks to overwrite critical settings within the application memory. This can result in an extension of rights at the application or even system level. Incorrect handling of the buffer limits can also enable attackers to read data outside the buffer instead of overwriting it. This practice is known as out of bounds. This method is also used by criminal hackers to spy on information about other possible attacks. Out of bounds are different from buffer overflow attacks, but they are made possible by the same programming errors.

    Recent Articles

    Unclear cyber attacks that target Covid-19 vaccine campaign

    Security researchers have discovered some cyber attacks that are targeted against the delivery of vaccine against COVID. The targeted attacks began in 2 months...

    New malware called Egregor is on the rise

    New malware is on the rise. The Egregor malware has only been in active for 2 months, but it is already becoming apparent that...

    Anyone with a smartphone can become a victim of cyber-mobbing

    Cyber-mobbing is becoming a huge risk in the current COVID crisis. According to a study, almost 20 percent of students in Germany are exposed...

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox