A flaw was found in popular software that’s used to manage processes in industries from manufacturing to energy.
The bad news: Researchers at Tenable, a security firm, found a serious bug in code from Schneider Electric, which has issued a fix after being given a heads-up about the problem. The flaw leaves the software vulnerable to a “buffer overflow attack.” Computer programs allocate set amounts of memory—or buffers—to hold data they’re working on. The attack pumps more data into a buffer than it’s designed to hold; the overflow corrupts memory nearby, letting hackers introduce malicious code there that can take control of servers and other systems.
The (slightly) better news: The attack worked with software running on Windows 7; more modern operating systems have built-in protections that make it much harder. That’s no reason to be complacent, though, because many industrial control systems with older OSes are still being hooked up to the internet.
Why this matters: Code governing control systems at industrial sites has already been the target of attacks, and US officials recently warned Russian hackers are probing for security holes in software controlling critical infrastructure like nuclear facilities and dams.
How Rust went from a side project to the world’s most-loved programming language
For decades, coders wrote critical systems in C and C++. Now they turn to Rust.
Welcome to the oldest part of the metaverse
Ultima Online, which just turned 25, offers a lesson in the challenges of building virtual worlds.
These simple design rules could turn the chip industry on its head
An open standard called RISC-V is rewriting the economics of chip design and shaking up the tech sector’s power dynamics.
These underwater cables can improve tsunami detection
Telecom companies have long resisted letting scientific sensors piggyback on their subsea cables—until now.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.