Saturday, April 5, 2014

CASE STUDY – NEWS OF THE WORLD PHONE HACKING SCANDAL (NOTW)


The world is growing rapidly with various technologies, and accordingly the illegal activities are being increased by adopting these new technologies. Every country has their own laws and regulations. In the UK people are convicted under the Computer Misuse Act 1990 for illegal activities, which are done with the help of technologies, and there are evidences proved that many people have been sentenced under those laws (Turner, M., 2013).Apart from that, there are few regulations such as RIPA 2000, which gives power to certain authorities in the UK to carry out surveillance or intercepting the communications against a person for a specific reason. The question is that how these laws are being used effectively and reasonably? Gaining information illegally or by misusing the power of rights is against the law and publishing this information is unethical and against Media Regulations.

Friday, April 4, 2014

Practical Buffer Overflow - Vulnerability Disclosure

Attackers generally use buffer overflows to corrupt the execution stack of a web application. By sending carefully crafted input to a web application, an attacker can cause the web application to execute arbitrary code, possibly taking over the machine. Attackers have managed to identify buffer overflows in a staggering array of products and components. Buffer overflow flaws can be present in both the web server and application server products that serve the static and dynamic portions of a site, or in the web application itself. Buffer overflows found in commonly-used server products are likely to become widely known and can pose a significant risk to users of these products. When web applications use libraries, such as a graphics library to generate images or a communications library to send e-mail, they open themselves to potential buffer overflow attacks.