Tag: security vulnerabilities
-
Cyber attacks : Buffer Overflow
Buffer overflow is one of the most infamous and longstanding vulnerabilities in computer security. It occurs when a program writes more data to a buffer—a contiguous block of memory—than it can hold. This overflow can corrupt adjacent memory, alter program execution, or allow attackers to inject malicious code. Buffer overflows are particularly dangerous because they…
-
Cyber Attacks: DNS poisoning
DNS (Domain Name System) poisoning, also known as DNS spoofing, is a type of cyberattack that compromises the DNS resolution process, redirecting users to malicious websites without their knowledge. As a foundational element of internet navigation, DNS translates human-readable domain names into IP addresses. DNS poisoning corrupts this process, enabling attackers to intercept or manipulate…