Comment: Buffers cause heaps of problems

clock • 3 min read

Hackers have exploited buffer overflow weaknesses in stacks since the 1980s. Now a new variation involving memory heaps could catch many firms unawares, says Neil Barrett

The first hacking "magic wand" I saw was the buffer overflow exploit used by Robert Morris in the original Internet Worm back in the late 1980s. Morris's father worked for the National Security A...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Hacking

Roku reports cyber breach impacting 576,000 accounts

Roku reports cyber breach impacting 576,000 accounts

Compromised data was used to make unauthorised purchases in fewer than 400 cases

clock 15 April 2024 • 2 min read
Dutch chipmaker Nexperia falls victim to cyberattack

Dutch chipmaker Nexperia falls victim to cyberattack

Hackers posted dozens of confidential documents on dark web

clock 15 April 2024 • 2 min read
 Apple warns users of 'mercenary spyware'

Apple warns users of 'mercenary spyware'

Highly targeted message sent to users in 92 countries

Penny Horwood
clock 11 April 2024 • 1 min read