New attack methods aimed at routers and mobile phones
A security expert at Juniper Networks has developed a new attack method that allows illegal programs to run on a variety of computer devices, including routers and mobile phones.
A security expert at Juniper Networks has developed a new attack method that allows illegal programs to run on a variety of computer devices, including routers and mobile phones.
At the CanSecWest security conference held in Vancouver on April 19, expert Barnaby Jack demonstrated how to control the router and insert malware into all computers in a network.
Jack said he has discovered a new method that allows turning a common error into a computer - an error deleting an empty mouse pointer reference into something more dangerous than what was previously known.
So far, the empty mouse hole is still not considered serious, although it may cause the computer to hang but does not cause any serious damage. For years, security researchers have known this type of vulnerability, which occurs when a computer notifies a program that a portion of the memory they are looking for does not exist, or "is empty".
However, at the April 19 show, Jack announced that an empty mouse hole could allow illegal software to be run on a variety of computer devices. This new technique is described by Jack as " 100% reliable and capable of executing code on the device ".
However, Jack's empty cursor error exploit code currently only operates on the processor arm Arm and xScale (being widely used for attached devices), not yet possible on architecture. Intel.
- Vending machines serve by mobile phones
- Children contaminated by mobile phones are twice as big as adults
- Mobile phones make children more vulnerable to stress
- Frequent use of mobile phones can cause cancer?
- Ways to use your phone to avoid cancer
- Japan tested the use of mobile phones in preventing epidemics
- Prohibit turning on cell phones on airplanes - fearsome fears?
- Humans will enter the era of wireless electricity
- The surprising truth about the 800-year-old mobile phone
- Mobile phones should not be used in storms
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system