|
Home | Forums | Gallery | Register | Video Directory | FAQ | Members List | Calendar | Games | Today's Posts | Search | Chat Room |
|
Thread Tools | Display Modes |
#1
|
||||
|
||||
ST06-006: Understanding Hidden Threats: Corrupted Software Files
ST06-006: Understanding Hidden Threats: Corrupted Software Files
03-09-2011 06:38 PM Original release date: March 09, 2011 | Last revised: February 06, 2013 Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people. What types of files can attackers corrupt? An attacker may be able to insert malicious code into any file, including common file types that you would normally consider safe. These files may include documents created with word processing software, spreadsheets, or image files. After corrupting the file, an attacker may distribute it through email or post it to a website. Depending on the type of malicious code, you may infect your computer by just opening the file. When corrupting files, attackers often take advantage of vulnerabilities that they discover in the software that is used to create or open the file. These vulnerabilities may allow attackers to insert and execute malicious scripts or code, and they are not always detected. Sometimes the vulnerability involves a combination of certain files (such as a particular piece of software running on a particular operating system) or only affects certain versions of a software program. What problems can malicious files cause? There are various types of malicious code, including viruses, worms, and Trojan horses (see Why is Cyber Security a Problem? for more information). However, the range of consequences varies even within these categories. The malicious code may be designed to perform one or more functions, including
Author: Mindi McDowell This product is provided subject to this Notification and this Privacy & Use policy. More... |
Sponsored Links |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
ST06-001: Understanding Hidden Threats: Rootkits and Botnets | The Patriot | Cyber Warfare | 0 | 02-27-2013 05:13 PM |
ST06-001: Understanding Hidden Threats: Rootkits and Botnets | The Patriot | Cyber Warfare | 0 | 03-20-2012 04:19 PM |
ST06-006: Understanding Hidden Threats: Corrupted Software Files | The Patriot | Cyber Warfare | 0 | 03-20-2012 04:19 PM |
ST06-001: Understanding Hidden Threats: Rootkits and Botnets | The Patriot | Cyber Warfare | 0 | 08-24-2011 03:20 PM |
ST06-006: Understanding Hidden Threats: Corrupted Software Files | The Patriot | Cyber Warfare | 0 | 03-10-2011 02:23 AM |
|