Tag: security vulnerabilities

  • Cyber attacks : Buffer Overflow

    Buffer overflow is one of the most infamous and longstanding vulnerabilities in computer security. It occurs when a program writes more data to a buffer—a contiguous block of memory—than it can hold. This overflow can corrupt adjacent memory, alter program execution, or allow attackers to inject malicious code. Buffer overflows are particularly dangerous because they…

  • Cyber Attacks: DNS poisoning

    DNS (Domain Name System) poisoning, also known as DNS spoofing, is a type of cyberattack that compromises the DNS resolution process, redirecting users to malicious websites without their knowledge. As a foundational element of internet navigation, DNS translates human-readable domain names into IP addresses. DNS poisoning corrupts this process, enabling attackers to intercept or manipulate…

  • Cyber Attack : Tailgating

    Tailgating, also known as “piggybacking,” is a physical security breach where an unauthorized individual gains access to restricted areas by following an authorized person. Often relying on human trust and behavioral tendencies, tailgating exploits lapses in vigilance to infiltrate secure zones without proper credentials. This low-tech yet potent attack highlights the importance of combining physical…