-
In his presentation, he described how Asterisk, an open-source VoIP application, can be attacked using what he said was an "extremely basic" method known as a buffer overflow.
FORBES: Magazine Article
-
The Linux "zombie" machines were compromised when hackers broke into them by exploiting a default setting for the network file system through an RFC buffer overflow, Rouland explains.
CNN: New denial-of-service attack tool uses chat programs
-
If we consider a virus to be the transport mechanism only, we will likely see payloads that we would identify as time and logic bombs, buffer overflow exploits, and Trojan horses.
CNN: Technology - Analysis: Understanding viruses
-
Security flaws in commercial software and hardware were popular topics at camp workshops, which included discussions on "Biometric Insecurity" and the construction of Windows NT Shell Code for Buffer Overflow Exploits.
CNN: Reporter's notebook: Hackers on holiday
-
In addition to checking daily for security updates, Mountain Lion includes app sandboxing to keep misbehaving apps from compromising your system, and kernel ASLR for improved protection against buffer overflow attacks.
ENGADGET: Apple brings Dictation to the Mac, tells Siri to stay in the car