Comment: Buffers cause heaps of problems

clock • 3 min read

Hackers have exploited buffer overflow weaknesses in stacks since the 1980s. Now a new variation involving memory heaps could catch many firms unawares, says Neil Barrett

The first hacking "magic wand" I saw was the buffer overflow exploit used by Robert Morris in the original Internet Worm back in the late 1980s. Morris's father worked for the National Security A...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Hacking

LockBit leader unmasked

LockBit leader unmasked

Named as Russian national Dmitry Khoroshev

clock 08 May 2024 • 3 min read
Ransomware group publishes stolen data from NHS Dumfries and Galloway on dark web

Ransomware group publishes stolen data from NHS Dumfries and Galloway on dark web

Chief Exec describes publication as “utterly abhorrent criminal act”

Penny Horwood
clock 07 May 2024 • 2 min read
MoD hacked: Personal details exposed

MoD hacked: Personal details exposed

Government suspects China

Tom Allen
clock 07 May 2024 • 2 min read