Online videos may be conduits for viruses

  • Thread starter Thread starter kach22i
  • Start date Start date
  • Tags Tags
    Videos
AI Thread Summary
Online videos are increasingly being identified as potential vectors for malware, according to a report from the Georgia Tech Information Security Center. As anti-spam measures improve, hackers are adapting by embedding malicious code in online video players. This evolution in threat delivery methods reflects a shift from traditional email scams to more creative techniques, such as using images or disguised files like PDFs. Recent incidents have included worms that launch corrupt websites or install spyware when media files are opened. Social networking sites and community-driven platforms are also becoming prime targets, as hackers can embed malicious code within user-generated content. The ongoing summit aims to address these emerging threats and develop countermeasures, including tighter validation standards and advanced analysis of malicious code, to stay ahead of evolving cyber risks.
kach22i
Messages
51
Reaction score
0
What do you computer people think of this article?

Online videos may be conduits for viruses
http://news.yahoo.com/s/ap/20071002/ap_on_hi_te/cybersecurity;_ylt=AsXBp3Bm.47l.m51w8IAvq6s0NUE
By GREG BLUESTEIN, Associated Press Writer Tue Oct 2, 7:46 AM ET
ATLANTA - Online videos aren't just for bloopers and rants — some might also be conduits for malicious code that can infect your computer.

As anti-spam technology improves, hackers are finding new vehicles to deliver their malicious code. And some could be embedded in online video players, according to a report on Internet threats released Tuesday by the Georgia Tech Information Security Center as it holds its annual summit.

The summit is gathering more than 300 scholars and security experts to discuss emerging threats for 2008 — and their countermeasures.

Among their biggest foes are the ever-changing vehicles that hackers use to deliver "malware," which can silently install viruses, probe for confidential info or even hijack a computer.

"Just as we see an evolution in messaging, we also see an evolution in threats," said Chris Rouland, the chief technology officer for IBM Corp.'s Internet Security Systems unit and a member of the group that helped draft the report. "As companies have gotten better blocking e-mails, we see people move to more creative techniques."

With computer users getting wiser to e-mail scams, malicious hackers are looking for sneakier ways to spread the codes. Over the past few years, hackers have moved from sending their spam in text-based messages to more devious means, embedding them in images or disguised as Portable Document Format, or PDF, files.

"The next logical step seems to be the media players," Rouland said.

There have only been a few cases of video-related hacking so far.

One worm discovered in November 2006 launches a corrupt Web site without prompting after a user opens a media file in a player. Another program silently installs spyware when a video file is opened. Attackers have also tried to spread fake video links via postings on YouTube.

That reflects the lowered guard many computer users would have on such popular forums.

"People are accustomed to not clicking on messages from banks, but they all want to see videos from YouTube," Rouland said.

Another soft spot involves social networking sites, blogs and wikis. These community-focused sites, which are driving the next generation of Web applications, are also becoming one of the juiciest targets for malicious hackers.

Computers surfing the sites silently communicate with a Web application in the background, but hackers sometimes secretly embed malicious code when they edit the open sites, and a Web browser will unknowingly execute the code. These chinks in the armor could let hackers steal private data, hijack Web transactions or spy on users.

Tuesday's forum gathers experts from around the globe to "try to get ahead of emerging threats rather than having to chase them," said Mustaque Ahamad, director of the Georgia Tech center.

They are expected to discuss new countermeasures, including tighter validation standards and programs that analyze malicious code. Ahamad also hopes the summit will be a launching pad of sorts for an informal network of security-minded programmers.
 
Last edited by a moderator:
Computer science news on Phys.org
All File can be a vehicles to deliver their malicious code.
Like this one. By adding javascript:function like<script><!--onload=""' --></script>



<asx version="3.0">
<author></author>
<title>Play List Name Here</title>
<entry>
<title>Song Name Here</title>
<ref href=""></ref>
</entry>
<!-- Put New Entry Here As Many as You Like
Save File As You_Name_It.asx Same Folder as File-->
<entry>
<title></title>
<ref href=""></ref>
</entry>
</asx>
 
Last edited:
In my discussions elsewhere, I've noticed a lot of disagreement regarding AI. A question that comes up is, "Is AI hype?" Unfortunately, when this question is asked, the one asking, as far as I can tell, may mean one of three things which can lead to lots of confusion. I'll list them out now for clarity. 1. Can AI do everything a human can do and how close are we to that? 2. Are corporations and governments using the promise of AI to gain more power for themselves? 3. Are AI and transhumans...
Thread 'ChatGPT Examples, Good and Bad'
I've been experimenting with ChatGPT. Some results are good, some very very bad. I think examples can help expose the properties of this AI. Maybe you can post some of your favorite examples and tell us what they reveal about the properties of this AI. (I had problems with copy/paste of text and formatting, so I'm posting my examples as screen shots. That is a promising start. :smile: But then I provided values V=1, R1=1, R2=2, R3=3 and asked for the value of I. At first, it said...
i am customizing a Linux distro [arch] into love os which I am building to impress my crush. I had an idea to integrate an ai model into the Linux system so it can speak like me but romantically. but I don't know what or how to do. I don't know the basic concept of Linux but yet I am customizing my os purely relying on chat gpt and perplexity. when i ask chat gpt about this it said to fine tune an ai model and integrate to the Linux distro and my friend said for the data to be fed to the ai...
Back
Top