You are here: Home » Technology » Computers
Business Standard

Downloading video clips can hurt you

Priyanka Joshi  |  New Delhi 

The next time you download a video clip from YouTube or any other video-hosting website, you could possibly be downloading a malicious code along with the clip that could infect your computer, take unauthorised control, and steal financial or other information from it.
''Users have got accustomed to not clicking on messages from banks and erstwhile e-card companies, but everybody wants to see videos from YouTube and similar sites,'' explains Kartik Shahani,sales director, McAfee India. As the popularity of flash media file formats continues to increase, hackers can now corrupt once the user has downloaded a media file onto the machine, or through video files when played on a media player.
A recent Georgia Tech Information Security Centre report reasons that as the Web 2.0 phenomenon makes Web applications more interactive and improves user experience, "it also pushes more code execution onto the client browser. ''Attackers will continue to post malicious links as part of the user's everyday online activity "" at the end of an instant messaging (IM) string, hidden in a YouTube video or embedded in an Excel spreadsheet,'' noted Paul Judge, Senior Vice President and Chief Officer, Secure Computing, in the report.
When browsing a Web 2.0 site, "the user's browser silently makes requests and communicates with the Web application in the background. This scenario gives hackers the opportunity to embed malicious code on an otherwise legitimate website, which the user's browser will automatically execute", explains the report.
Over the past few years, hackers have moved from sending their spam in text-based messages to more devious means, embedding them in images or disguised as Portable Document Format (PDF) files. ''The next logical direction was videos and user generated multimedia content that is quite popular,'' says Lumension Security's regional director (India and SAARC), Shamshad Ahmed.
''In some cases, the web-enabled phones are used to view videos and that could either damage the mobile data or allow the hacker to access the handset data,'' notes Ahmed.
Lumension is quick to point out, that IT administrators must add video data to corporate security policies. ''Businesses can no longer assume the position that video data is benign.''
Blocking the virus programmes to download themselves automatically, the corrupted video files can be prevented from doing any harm to the user machine. McAfee prescribes that all media players should be included in security patching policy and execution.

Dear Reader,


Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

First Published: Sun, October 14 2007. 00:00 IST
RECOMMENDED FOR YOU