| ''Users have got accustomed to not clicking on messages from banks and erstwhile e-card companies, but everybody wants to see videos from YouTube and similar sites,'' explains Kartik Shahani,sales director, McAfee India. As the popularity of flash media file formats continues to increase, hackers can now corrupt computers once the user has downloaded a media file onto the machine, or through video files when played on a media player. |
| A recent Georgia Tech Information Security Centre report reasons that as the Web 2.0 phenomenon makes Web applications more interactive and improves user experience, "it also pushes more code execution onto the client browser. ''Attackers will continue to post malicious links as part of the user's everyday online activity "" at the end of an instant messaging (IM) string, hidden in a YouTube video or embedded in an Excel spreadsheet,'' noted Paul Judge, Senior Vice President and Chief Technology Officer, Secure Computing, in the report. |
| When browsing a Web 2.0 site, "the user's browser silently makes requests and communicates with the Web application in the background. This scenario gives hackers the opportunity to embed malicious code on an otherwise legitimate website, which the user's browser will automatically execute", explains the report. |
| Over the past few years, hackers have moved from sending their spam in text-based messages to more devious means, embedding them in images or disguised as Portable Document Format (PDF) files. ''The next logical direction was videos and user generated multimedia content that is quite popular,'' says Lumension Security's regional director (India and SAARC), Shamshad Ahmed. |
| ''In some cases, the web-enabled phones are used to view videos and that could either damage the mobile data or allow the hacker to access the handset data,'' notes Ahmed. |
| Lumension is quick to point out, that IT administrators must add video data to corporate security policies. ''Businesses can no longer assume the position that video data is benign.'' |
| Blocking the virus programmes to download themselves automatically, the corrupted video files can be prevented from doing any harm to the user machine. McAfee prescribes that all media players should be included in security patching policy and execution. |
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
