The Hacker News — Most Popular Cyber Security, Hacking News Site: Buffer Overflow

New Rowhammer Attack Can Hijack Computers Remotely Over the Network

New Rowhammer Attack Can Hijack Computers Remotely Over the Network

May 10, 2018Mohit Kumar
Exploitation of Rowhammer attack just got easier. Dubbed ‘ Throwhammer ,’ the newly discovered technique could allow attackers to laun...
Nintendo Switches Hacked to Run Linux—Unpatchable Exploit Released

Nintendo Switches Hacked to Run Linux—Unpatchable Exploit Released

April 24, 2018Mohit Kumar
Two separate teams of security researchers have published working proof-of-concept exploits for an unpatchable vulnerability in Nvidia&#...
Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

April 04, 2018Swati Khandelwal
Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow a...
Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response

Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response

June 28, 2017Swati Khandelwal
A critical vulnerability has been discovered in Systemd , the popular init system and service manager for Linux operating systems, that c...
Critical Skype Bug Lets Hackers Remotely Execute Malicious Code

Critical Skype Bug Lets Hackers Remotely Execute Malicious Code

June 27, 2017Mohit Kumar
A critical vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that cou...
Next Windows 10 Version May Have Built-in EMET Anti-Exploit Program

Next Windows 10 Version May Have Built-in EMET Anti-Exploit Program

June 20, 2017Mohit Kumar
It seems Microsoft is planning to build its EMET anti-exploit tool into the kernel of Windows 10 Creator Update (also known as RedStone 3...
Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air

Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air

April 04, 2017Swati Khandelwal
Millions of smartphones and smart gadgets, including Apple iOS and many Android handsets from various manufacturers, equipped with Broadc...
Linux Kernel Gets Patch For Years-Old Serious Vulnerability

Linux Kernel Gets Patch For Years-Old Serious Vulnerability

March 16, 2017Swati Khandelwal
Another dangerous vulnerability has been discovered in Linux kernel that dates back to 2009 and affects a large number of Linux distros, ...
Mirai Botnet Itself is Flawed; Hacking Back IoTs Could Mitigate DDoS Attacks

Mirai Botnet Itself is Flawed; Hacking Back IoTs Could Mitigate DDoS Attacks

October 28, 2016Mohit Kumar
The infamous botnet that was used in the recent massive distributed denial of service (DDoS) attacks against the popular DNS provider Dyn...
High-Severity OpenSSL Vulnerability allows Hackers to Decrypt HTTPS Traffic

High-Severity OpenSSL Vulnerability allows Hackers to Decrypt HTTPS Traffic

May 04, 2016Mohit Kumar
OpenSSL has released a series of patches against six vulnerabilities, including a pair of high-severity flaws that could allow attackers ...
Serious, Yet Patched Flaw Exposes 6.1 Million IoT, Mobile Devices to Remote Code Execution

Serious, Yet Patched Flaw Exposes 6.1 Million IoT, Mobile Devices to Remote Code Execution

December 04, 2015Swati Khandelwal
As much as you protect your electronics from being hacked, hackers are clever enough at finding new ways to get into your devices. But, ...
Billions of Android Devices Vulnerable to Privilege Escalation Except Android 5.0 Lollipop

Billions of Android Devices Vulnerable to Privilege Escalation Except Android 5.0 Lollipop

November 19, 2014Wang Wei
A security weakness in Android mobile operating system versions below 5.0 that puts potentially every Android device at risk for privi...
Android 4.3 and Earlier versions Vulnerable to Critical Code-Execution Flaw

Android 4.3 and Earlier versions Vulnerable to Critical Code-Execution Flaw

June 26, 2014Swati Khandelwal
A critical code-execution vulnerability almost affecting everyone those are not running the most updated version of Google Android , i.e...
Critical GnuTLS Flaw Leaves SSL Clients Vulnerable to Remote Code Execution

Critical GnuTLS Flaw Leaves SSL Clients Vulnerable to Remote Code Execution

June 04, 2014Mohit Kumar
GnuTLS, a widely used open source SSL/TLS cryptographic library is vulnerable to a buffer overflow vulnerability that could be exploited...
23-year-old Stack overflow vulnerability discovered in X11 Server

23-year-old Stack overflow vulnerability discovered in X11 Server

January 09, 2014Anonymous
X.Org Foundation develops the X-Window System, the standard window system for open source operating systems and devices. Most of the graphi...
Windows Error Crash Reports or Treasure of Zero-Day vulnerabilities for NSA?

Windows Error Crash Reports or Treasure of Zero-Day vulnerabilities for NSA?

January 02, 2014Swati Khandelwal
I am sure that you all have been familiar with the above shown annoying Window Operating System error messages that many times pop ups on yo...