A serious vulnerability in the Linux kernel has been announced, with the researcher who discovered and reported it saying it "allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes".
A script that mines for cryptocurrencies on Linux systems first needs to infect these systems, either by using brute force to guess SSH passwords or else by gaining entry through the use of stolen credentials that can be bought on dark web forums.
A privilege-escalation bug in the Linux kernel, that could allow any application to gain root-level access and take over a device, has been present in the kernel since version 2.6.22 which was released in 2007.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]