How much do ARM-like link registers make return-oriented programming harder?

ROP usually uses a buffer overflow to overwrite the x86 return address. However, ARM stores that in a register. What is the effect of this on return-oriented programming attacks on non-x86 architectures?
On x86, the CALL instruction pushes… Continue reading How much do ARM-like link registers make return-oriented programming harder?

How much do ARM-like link registers make return-oriented programming harder?

ROP usually uses a buffer overflow to overwrite the x86 return address. However, ARM stores that in a register. What is the effect of this on return-oriented programming attacks on non-x86 architectures?
On x86, the CALL instruction pushes… Continue reading How much do ARM-like link registers make return-oriented programming harder?

TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers ‘Apply Psychological Pressure”

Ransomware attackers know where your kids go to school and they want you to know it, according to professional negotiators at Sygnia. Continue reading TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers ‘Apply Psychological Pressure”

Capital One hacker Paige Thompson got too light a sentence, appeals court rules

Two of the three judges said five years’ probation and time served didn’t match the severity of the crime, among other reasons for overturning the sentence.

The post Capital One hacker Paige Thompson got too light a sentence, appeals court rules appeared first on CyberScoop.

Continue reading Capital One hacker Paige Thompson got too light a sentence, appeals court rules