Breaking News

Why has G.SKILL DRAM memory prices increased so much recently (since 2025 Q4) Samsung Expands Premium Micro RGB TV Lineup for 2026 with New Sizes and Advanced Features Viltrox AF 35mm F1.2 LAB Z Launch Ends Year With a Milestone Arctic announces MX-7 – ULTIMATE Performance Thermal Paste Akasa introduces Euler TX3 Fanless Thin Mini‑ITX Case

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Online Sharing Videos Could Attract Hackers

Online Sharing Videos Could Attract Hackers

Enterprise & IT Aug 3,2007 0

Online sharing of videos and music at the heart of today's Internet lifestyle gives hackers dangerous new avenues for attacking computers, security specialists said Thursday. Malicious code can be hidden in video streamed or downloaded from websites such as YouTube or songs streamed from social-networking websites including MySpace, iSEC researcher David Thiel demonstrated at a Black Hat gathering of computer protection professionals in Las Vegas.
BR> "The potential for attack is pretty severe," Thiel said. "Any MySpace page you go to you can't get it to stop playing music at you. You will probably start seeing malware installs this way just like we see through images."
BR> The kinds of "malware," malicious software, that can be "injected" through video or music files run the gamut from programs meant to simply be annoying to code that takes command of infected machines for "bot armies."
BR> "Stream formats are good for containing exploit code and are quite dangerous because of the widespread use of it with kids online these days," Thiel said.
BR> Applications vulnerable to hackers include those used for MP3 music files; a speech feature in Microsoft's Xbox Live online video game software, and Internet telephony, according to Thiel.
BR> Security specialists at Black Hat say the popularity of "user-generated content" considered a defining characteristic of today's Web 2.0 Internet opens users to betrayal and attack online.
BR> "Web 2.0 is a trust model with users controlling the content," said Websense researcher Stephan Chenette.
BR> "You are building this gigantic network of friends. You have to trust that I am who I say I am and that the content is what I say it is. Trust is sometimes taken advantage of."
BR> Last year it was revealed hackers use RSS (Really Simple Syndication) feeds to distribute malicious code to thousands of people instantly.
BR> Thiel believes music recording labels and movie studios will use flaws in media files to insert stealth coding that tracks or disables pirated songs, shows or movies.
BR> Media software applications vulnerable to hacking are being used in "smart" mobile telephones as well as cars and home multi-media systems, according to Thiel.

Tags: internet
Previous Post
Microsoft and Apple Extend Font Licensing Agreement
Next Post
BenQ Introduced 10 Mega Pixels E1000 Digital Camera

Related Posts

  • How to Navigate the Internet Safely 4 Essential Tips

  • Facebook Works With Telecoms on 2Africa Subsea Cable for Future Internet Connectivity

  • Facebook Needs to Get Remaining 3.5 Billion People Online

  • U.S. Court Rejected Requests to Rehear Net Neutrality Appeal

  • Storing Cookies Requires Internet Users’ Active Consent, EU Court Rules

  • Democrats Attempt to Bring Back Net Neutrality Rules

  • China Deletes 7 Million Items of Online Information

  • Microsoft Airband Initiative Brings Rural Broadband to More Users

Latest News

Why has G.SKILL DRAM memory prices increased so much recently (since 2025 Q4)
PC components

Why has G.SKILL DRAM memory prices increased so much recently (since 2025 Q4)

Samsung Expands Premium Micro RGB TV Lineup for 2026 with New Sizes and Advanced Features
Consumer Electronics

Samsung Expands Premium Micro RGB TV Lineup for 2026 with New Sizes and Advanced Features

Viltrox AF 35mm F1.2 LAB Z Launch Ends Year With a Milestone
Cameras

Viltrox AF 35mm F1.2 LAB Z Launch Ends Year With a Milestone

Arctic announces MX-7 – ULTIMATE Performance Thermal Paste
Cooling Systems

Arctic announces MX-7 – ULTIMATE Performance Thermal Paste

Akasa introduces Euler TX3 Fanless Thin Mini‑ITX Case
Cooling Systems

Akasa introduces Euler TX3 Fanless Thin Mini‑ITX Case

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed