Wednesday, April 23, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
AT&T Partners With Chernin In Video Venture
Pioneer BDP-170 Blu-ray Disc Player Comes With Wi-Fi, Miracast And Youtube Connectivity
LG's G Watch is Water Resistant
Micron Releases New Solid State Drive For Data Centers
Toshiba Joins GLOBALSOLUTIONS Ecosystem
Apple Is Eyes The Electronic Payments Market
G.Skill Launches 32GB DDR3L-2133 1.35V SO-DIMM Memory Kit
Apple Makes Progress on Reducing Environmental Impact
Active Discussions
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
Video editing software.
 Home > News > General Computing > JPEG ex...
Last 7 Days News : SU MO TU WE TH FR SA All News

Wednesday, September 29, 2004
JPEG exploit could beat antivirus software


Antivirus software could be ill-prepared to protect corporate networks from the latest Windows vulnerability--innocent-looking JPEG files that contain security attacks.

According to Mikko Hypponen, director of antivirus research for F-Secure, antivirus software will strain to find JPEG malware, because by default, it only searches for .exe files.

"Normal antivirus software, by default, will not detect JPEGs," Hypponen said. "You can set your antivirus scanner to look for JPEG, but the trouble is that you can change the file extension on a JPEG to so many things."

There are about 11 file name extensions to which JPEGs can be changed, including .icon or .jpg2. Hypponen said this would make finding malicious JPEGs even more difficult; searching could take up a significant amount of valuable processor power.

Internet Explorer processes JPEGs before it caches them. That could also mean that desktops may become infected before antivirus software has a chance to work.

"This means that it is not enough to scan at the desktop," Hypponen said. "You have to scan at the gateway, but this will put a huge load on your bandwidth."


Previous
Next
Piracy fears threaten Hollywood innovation        All News        BenQ launches sophisticated FP785 LCD display at Just Cavalli fashion show
Piracy fears threaten Hollywood innovation     General Computing News      Hitachi and HP Offer Industry-First High-Performance 300 Gigabyte Drives for Server and Storage Solutions

Source Link Get RSS feed Easy Print E-Mail this Message

Related News
Nokia Devices and Services Acquisition Expected to Close This Week
Microsoft and Motorola Solutions Sign Licensing Agreement
China Approves Sale of Nokia's Business to Microsoft
Microsoft Announces New Cloud Tools
Microsoft Previews .NET Native Platform For App Developers
Microsoft Says It Won't Search Users' Emails For Stolen Property
Microsoft and Dell Sign Patent Licensing Deal
Microsoft Opens Source Code for MS-DOS and Word For Windows to Public
Nokia, Microsoft Deal Delayed
Microsoft Searched Hotmail Messages To Track Leak
SQL Server 2014 Coming April 1st
Microsoft Releases 2013 Law Enforcement Requests Report

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .