వార్తలు

What is a buffer overflow, how is this software vulnerability exploited by hackers and how can you defend against buffer overflow attacks?
AOL Time Warner warns people to update outdated ICQ software versions or risk becoming a casualty of a potentially damaging buffer overflow attack.
"A buffer overflow attack works when an hacker sends a program requesting enough data that causes a memory overflow and enables him to write onto the otherwise forbidden memory locations.
The BSD libc library was updated recently to address a buffer overflow vulnerability that could have allowed an attacker to execute arbitrary code.
Over 660,000 exposed Rsync servers are potentially vulnerable to six new vulnerabilities, including a critical-severity heap-buffer overflow flaw that allows remote code execution on servers.
Kernel-mode Hardware-enforced Stack Protection is a security feature introduced in Windows 11 22H2 that protects systems from various memory attacks, such as stack buffer overflows.
ASLR is a memory exploitation mitigation technique used on both Linux and Windows systems. Learn how to tell if it's running, enable/disable it, and get a view of how it works.
New variants of the Spectre microprocessor bugs use buffer overflow-style attacks to run malicious code.
This excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw, and published by Addison-Wesley Professional.
Cigital warned that a Visual C++ .Net compiler just announced by Microsoft is susceptible to a buffer overflow attack.