Security Researchers Prove IE8 Still Vulnerable
Two hackers took just two minutes to break into a PC running Windows 7 64-bit with Internet Explorer 8 at a security conference earlier this week.
The ethical hacking took place at the CanSecWest security event in Vancouver, which hosts an annual contest named "Pwn2Own." The name is taken from an online corruption of "own" in two senses: whomever is first to take control of a system wins the relevant hardware, plus between $5,000 and $10,000 in cash. (Source: darkreading.com)
Windows 7 DEP and ASLR Hacked, Disabled
In the contest, the hackers were not able to physically access the machine. Instead, the usual approach is to ask a judge to point the computer towards a malicious website, in the same way as if a unsuspecting user had clicked on a dubious link. In most cases, the contestant will have developed a strategy and created the bogus website before the event, meaning their contest entry takes effect almost immediately.
The winning tactics involved disabling two key security measures in the system. Data Execution Prevention (DEP) aims to prevent rogue software accessing parts of the PC's memory via a buffer overflow, in which the commands sent through the PC literally spill over into parts of the memory.
Address Space Layout Randomization (ASLR) involves key areas of data on the machine being arranged in a random order, making it much harder for rogue software to know exactly where to target. (Source: computerworld.com)
Mozilla's Firefox, MacBook Fall Prey
The hackers, who used programming code to fool the machine into bypassing the security measures, also targeted Firefox later in the day. However, Microsoft wasn't the quickest victim: three-time Pwn2Own winner Charlie Miller carried out the first successful attack of the day, taking down an Apple MacBook running the Safari web browser.
The contest also had a mobile device category for the first time, with an iPhone being hacked in a staggering 20 seconds, the exploit gaining complete access to the database of text messages on the handset,
The organizers of the contest share details of the winning entries with the relevant companies. That hasn't stopped some criticism that the competition prizes encourage some entrants to "save up" details of potential security flaws to win the cash, rather than notify the manufacturers as soon as they are discovered.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.