Thursday, August 17, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Google Home Now Supports Free Calls
Asus Unveils the ZenFone 4 Pro, ZenFone 4, ZenFone 4 Selfie Pro, and ZenFone 4 Selfie
Nokia 8 Shipped With ZEISS Optics
Apple is Getting Serious in TV Shows and Film Prospect
Acer's New 4K Projectors Bring the Benefits of Cinema Home
Fiat Chrysler Joins BMW, Intel, Mobileye in Autonomous Driving Team
Kingston Adds Lower 4GB and 8GB Capacities to DataTraveler 2000 Encrypted USB
Intel Ice Lake Architecture Will Find its Way to 10nm+ Chips
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Online ...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, August 03, 2007
Online Sharing Videos Could Attract Hackers


Online sharing of videos and music at the heart of today's Internet lifestyle gives hackers dangerous new avenues for attacking computers, security specialists said Thursday.

Malicious code can be hidden in video streamed or downloaded from websites such as YouTube or songs streamed from social-networking websites including MySpace, iSEC researcher David Thiel demonstrated at a Black Hat gathering of computer protection professionals in Las Vegas.
BR> "The potential for attack is pretty severe," Thiel said. "Any MySpace page you go to you can't get it to stop playing music at you. You will probably start seeing malware installs this way just like we see through images."
BR> The kinds of "malware," malicious software, that can be "injected" through video or music files run the gamut from programs meant to simply be annoying to code that takes command of infected machines for "bot armies."
BR> "Stream formats are good for containing exploit code and are quite dangerous because of the widespread use of it with kids online these days," Thiel said.
BR> Applications vulnerable to hackers include those used for MP3 music files; a speech feature in Microsoft's Xbox Live online video game software, and Internet telephony, according to Thiel.
BR> Security specialists at Black Hat say the popularity of "user-generated content" considered a defining characteristic of today's Web 2.0 Internet opens users to betrayal and attack online.
BR> "Web 2.0 is a trust model with users controlling the content," said Websense researcher Stephan Chenette.
BR> "You are building this gigantic network of friends. You have to trust that I am who I say I am and that the content is what I say it is. Trust is sometimes taken advantage of."
BR> Last year it was revealed hackers use RSS (Really Simple Syndication) feeds to distribute malicious code to thousands of people instantly.
BR> Thiel believes music recording labels and movie studios will use flaws in media files to insert stealth coding that tracks or disables pirated songs, shows or movies.
BR> Media software applications vulnerable to hacking are being used in "smart" mobile telephones as well as cars and home multi-media systems, according to Thiel.


Previous
Next
Microsoft and Apple Extend Font Licensing Agreement        All News        BenQ Introduced 10 Mega Pixels E1000 Digital Camera
Microsoft and Apple Extend Font Licensing Agreement     General Computing News      FCC Sets Airwaves Sale Rule

Get RSS feed Easy Print E-Mail this Message

Related News
Samsung Begins Mass Production of Exynos i T200 IoT Chip
New Samsung ARTIK Platform Accelerates IoT
Samsung Develops Mobile Chip for IoT Applications, Eyes MRAM Embedded Memory
Micron and Microsoft To Collaborate On Internet of Things Security
ARM Accelerates Secure IoT from Chip to Cloud
Intel introduces Atom E3900 processors For IoT
Samsung And SK Telecom To Build LoRaWAN Network For Internet of Things
ARM Unveils Technologies to Speed-Up Deployment of IoT Devices
Intel Unveils New IoT Platform
Intel Introduces Smart Tiny House Concept For IoT Connected Devices
Google Releases Source Code For Brillo OS
New York Attorney To Probe ISP's Internet Speeds

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .