Just In
- 44 min ago iQOO Z9 Turbo Launched in China: Snapdragon 8s Gen 3, 16GB RAM, and More
- 1 hr ago iQOO Z9, Z9x Launched in China: 6000mAh Battery, iQOO 12 Inspired Design, 50MP Camera, & More
- 2 hrs ago HMD Branded First Set of Android Smartphones Are Here!
- 3 hrs ago OnePlus 13 New Leak Reveals Display and Camera Details; What to Expect?
Don't Miss
- Sports Most Runs in IPL 2024, Orange Cap Holder: Top 10 Highest Run Scorers And Team-wise Top 5 Batters On April 24
- Movies Dance Deewane 4: Karisma Kapoor Gives Epic Reaction Witnessing Little Contestant’s On-point Expressions, Watch
- News INDIA Bloc's One Year-One PM Formula Will Destroy Country: PM Modi
- Finance Rs 24/Share Dividend: Buy Large Cap FMCG Stock, Highest TP Rs 2900: Motilal, PL, 5paisa Bullish
- Education MP Board Class 10th, 12th Results 2024, Know Alternative Ways to Check Your Result
- Automobiles Aston Martin Vantage Launched In India At Rs 3.99 Crore
- Travel Mumbai Opens BMC Headquarters For Exclusive Heritage Tour
- Lifestyle Summer Style: 6 Must-Try Colors To Stay Fashionably Cool Like B-Town Divas!
Linux operating systems vulnerable to cyber attacks: Report
Researchers from University of California-Riverside have identified a weakness in the Transmission Control Protocol (TCP) of all Linux operating systems that enables attackers to remotely hijack users' internet communications.
Such a weakness could be used to launch targeted attacks that track users' online activity, forcibly terminate a communication, hijack a conversation between hosts or degrade the privacy guarantee by anonymity networks such as Tor.
SEE ALSO: FACT OR MYTH: Here's Why You Can't Use A Smartphone in a Petrol/Gas Station!
To transfer information from one source to another, Linux and other operating systems use the Transmission Control Protocol (TCP) to package and send data, and the Internet Protocol (IP) to ensure the information gets to the correct destination.
When two people communicate by email, TCP assembles their message into a series of data packets, identified by unique sequence numbers, that are transmitted, received, and reassembled into the original message.
Those TCP sequence numbers are useful to attackers, but with almost four billion possible sequences, it is essentially impossible to identify the sequence number associated with any particular communication by chance.
SEE ALSO: CoolPad Mega 2.5D Smartphone Launched With Smart Beautification Feature for Selfies at Rs 6,999
The researchers led by Yue Cao, computer science graduate student, identified a subtle flaw in the Linux software that enables attackers to infer the TCP sequence numbers associated with a particular connection with no more information than the IP address of the communicating parties.
This means that given any two arbitrary machines on the internet, a remote blind attacker without being able to eavesdrop on the communication, can track users' online activity, terminate connections with others and inject false material into their communications.
The weakness can allow attackers to degrade the privacy of anonymity networks, such as Tor, by forcing the connections to route through certain relays, the authors stated.
The attack is fast and reliable, happens in less than a minute and has a success rate of about 90 per cent.
SEE ALSO: Xiaomi Mi Note 2: Top Specifications Which Are Confirmed Ahead of Launch
The researchers alerted Linux about the vulnerability which resulted in patches applied to the latest Linux version.
The study was set to be presented at the USENIX Security Symposium in Austin, Texas, this week.
Source IANS
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
11,999
-
16,026
-
14,248
-
14,466
-
26,634
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804