Hackers have exploited buffer overflow weaknesses in stacks since the 1980s. Now a new variation involving memory heaps could catch many firms unawares, says Neil Barrett
The first hacking "magic wand" I saw was the buffer overflow exploit used by Robert Morris in the original Internet Worm back in the late 1980s. Morris's father worked for the National Security A...
To continue reading this article...
Join Computing
- Unlimited access to real-time news, analysis and opinion from the technology industry
- Receive important and breaking news in our daily newsletter
- Be the first to hear about our events and awards programmes
- Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
- Access to the Computing Delta hub providing market intelligence and research
- Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders