إظهار الرسائل ذات التسميات Linux hacking. إظهار كافة الرسائل
إظهار الرسائل ذات التسميات Linux hacking. إظهار كافة الرسائل
الأربعاء، 17 فبراير 2016
Critical glibc Flaw Puts Linux Machines and Apps at Risk (Patch Immediately)
A highly critical vulnerability has been uncovered in the GNU C Library (glibc), a key component of most Linux distributions, that leaves nearly all Linux machines, thousands of apps and electronic devices vulnerable to hackers that can take full control over them.
Just clicking on a link or connecting to a server can result in remote code execution (RCE), allowing hackers to steal
Labels:
DNS hijacking,
glibc,
GNU C Library,
Google Security,
hacking news,
Linux hacking,
Linux OS,
Linux security,
programming,
remote code execution,
Vulnerability
الثلاثاء، 19 يناير 2016
Zero-Day Flaw Found in 'Linux Kernel' leaves Millions Vulnerable
A new critical zero-day vulnerability has been discovered in the Linux kernel that could allow attackers to gain root level privileges by running a malicious Android or Linux application on an affected device.
The critical Linux kernel flaw (CVE-2016-0728) has been identified by a group of researchers at a startup named Perception Point.
The vulnerability was present in
السبت، 2 مايو 2015
Mumblehard Malware Targets Linux and FreeBSD Servers
Thousands of computers and web servers running Linux and FreeBSD operating systems have been infected over past five years with sophisticated malware that turn the machines into spambots.
The new Linux malware, discovered by the security researchers from the antivirus provider Eset, has been dubbed "Mumblehard" because it is Muttering spam from your servers, says Eset 23-page long report (
الثلاثاء، 10 مارس 2015
DRAM Rowhammer vulnerability Leads to Kernel Privilege Escalation
Security researchers have find out ways to hijack the Intel-compatible PCs running Linux by exploiting the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access memory) chips and gaining higher kernel privileges on the system.
The technique, dubbed "rowhammer", was outlined in a blog post published Monday by Google's Project Zero security initiative
الخميس، 12 فبراير 2015
How to Detect Exploits of the GHOST Buffer Overflow Vulnerability
The GHOST vulnerability is a buffer overflow condition that can be easily exploited locally and remotely, which makes it extremely dangerous. This vulnerability is named after the GetHOSTbyname function involved in the exploit.
Attackers utilize buffer overflow vulnerabilities like this one by sending specific packets of data to a vulnerable system. The attack allows the attacker to
الاشتراك في:
الرسائل (Atom)