Death from youtube..?Just a FYI

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • thome
    ROTH ARMY ELITE
    • Mar 2005
    • 6678

    Death from youtube..?Just a FYI

    Heard the news today about the encoding of viruses inside youtube vids .....whatever....is this old / new ......whatever....?

    Will the punks stop at nothing to harass the masses and giggle...
  • Coyote
    ROTH ARMY SUPREME
    • Jan 2004
    • 8185

    #2
    Never heard about this...
    Why settle for something you have, if it's not as good as something you're out to get?

    Originally posted by Seshmeister
    It's like putting up a YouTube of Bach and playing Chopstix on your Bontempi...

    Comment

    • Diamondjimi
      DIAMOND STATUS
      • May 2004
      • 12086

      #3
      WTF???

      Youtube just signed it's own death warrant. IMO.

      Can any computer wizzez on here shed some light on the so called encode virus ?

      Last edited by Diamondjimi; 10-05-2007, 06:23 PM.
      Trolls take heed...LOG OUT & FUCK OFF!!!

      Comment

      • thome
        ROTH ARMY ELITE
        • Mar 2005
        • 6678

        #4
        Originally posted by diamondjimi
        WTF???

        Youtube just signed it's own death warrant. IMO.

        Can any computer wizzez on here shed some light on the so called encode virus ?

        If you have active Norton you will be fine.???(guessing here).

        That's all I have got rid of my spyware(spybot) and adaware.

        Anti intruder software..??

        I am not up on the latest....

        Comment

        • LoungeMachine
          DIAMOND STATUS
          • Jul 2004
          • 32576

          #5
          ANYBODY EVER HEARD OF GOOGLE NEWS ???


          CBS NewsOct. 5, 2007 3:31pm


          Hackers Eye Online Videos

          Report Says Online Video Players Could Be Used To Spread And Carry Malicious Code

          ATLANTA, Oct. 2, 2007

          --------------------------------------------------------------------------------


          (AP / CBS)




          (AP) Online videos aren't just for bloopers and rants - some might also be conduits for malicious code that can infect your computer.

          As anti-spam technology improves, hackers are finding new vehicles to deliver their malicious code. And some could be embedded in online video players, according to a report on Internet threats released Tuesday by the Georgia Tech Information Security Center as it holds its annual summit.

          The summit is gathering more than 300 scholars and security experts to discuss emerging threats for 2008 - and their countermeasures.

          Among their biggest foes are the ever-changing vehicles that hackers use to deliver "malware," which can silently install viruses, probe for confidential info or even hijack a computer.

          "Just as we see an evolution in messaging, we also see an evolution in threats," said Chris Rouland, the chief technology officer for IBM Corp.'s Internet Security Systems unit and a member of the group that helped draft the report. "As companies have gotten better blocking e-mails, we see people move to more creative techniques."

          With computer users getting wiser to e-mail scams, malicious hackers are looking for sneakier ways to spread the codes. Over the past few years, hackers have moved from sending their spam in text-based messages to more devious means, embedding them in images or disguised as Portable Document Format, or PDF, files.

          "The next logical step seems to be the media players," Rouland said.

          There have only been a few cases of video-related hacking so far.

          One worm discovered in November 2006 launches a corrupt Web site without prompting after a user opens a media file in a player. Another program silently installs spyware when a video file is opened. Attackers have also tried to spread fake video links via postings on YouTube.

          That reflects the lowered guard many computer users would have on such popular forums.

          "People are accustomed to not clicking on messages from banks, but they all want to see videos from YouTube," Rouland said.

          Another soft spot involves social networking sites, blogs and wikis. These community-focused sites, which are driving the next generation of Web applications, are also becoming one of the juiciest targets for malicious hackers.

          Computers surfing the sites silently communicate with a Web application in the background, but hackers sometimes secretly embed malicious code when they edit the open sites, and a Web browser will unknowingly execute the code. These chinks in the armor could let hackers steal private data, hijack Web transactions or spy on users.

          Tuesday's forum gathers experts from around the globe to "try to get ahead of emerging threats rather than having to chase them," said Mustaque Ahamad, director of the Georgia Tech center.

          They are expected to discuss new countermeasures, including tighter validation standards and programs that analyze malicious code. Ahamad also hopes the summit will be a launching pad of sorts for an informal network of security-minded programmers.



          Originally posted by Kristy
          Dude, what in the fuck is wrong with you? I'm full of hate and I do drugs.
          Originally posted by cadaverdog
          I posted under aliases and I jerk off with a sock. Anything else to add?

          Comment

          • thome
            ROTH ARMY ELITE
            • Mar 2005
            • 6678

            #6
            Originally posted by LoungeMachine
            ANYBODY EVER HEARD OF GOOGLE NEWS ???


            CBS NewsOct. 5, 2007 3:31pm


            Hackers Eye Online Videos

            Report Says Online Video Players Could Be Used To Spread And Carry Malicious Code

            ATLANTA, Oct. 2, 2007

            --------------------------------------------------------------------------------


            (AP / CBS)




            (AP) Online videos aren't just for bloopers and rants - some might also be conduits for malicious code that can infect your computer.

            As anti-spam technology improves, hackers are finding new vehicles to deliver their malicious code. And some could be embedded in online video players, according to a report on Internet threats released Tuesday by the Georgia Tech Information Security Center as it holds its annual summit.

            The summit is gathering more than 300 scholars and security experts to discuss emerging threats for 2008 - and their countermeasures.

            Among their biggest foes are the ever-changing vehicles that hackers use to deliver "malware," which can silently install viruses, probe for confidential info or even hijack a computer.

            "Just as we see an evolution in messaging, we also see an evolution in threats," said Chris Rouland, the chief technology officer for IBM Corp.'s Internet Security Systems unit and a member of the group that helped draft the report. "As companies have gotten better blocking e-mails, we see people move to more creative techniques."

            With computer users getting wiser to e-mail scams, malicious hackers are looking for sneakier ways to spread the codes. Over the past few years, hackers have moved from sending their spam in text-based messages to more devious means, embedding them in images or disguised as Portable Document Format, or PDF, files.

            "The next logical step seems to be the media players," Rouland said.

            There have only been a few cases of video-related hacking so far.

            One worm discovered in November 2006 launches a corrupt Web site without prompting after a user opens a media file in a player. Another program silently installs spyware when a video file is opened. Attackers have also tried to spread fake video links via postings on YouTube.

            That reflects the lowered guard many computer users would have on such popular forums.

            "People are accustomed to not clicking on messages from banks, but they all want to see videos from YouTube," Rouland said.

            Another soft spot involves social networking sites, blogs and wikis. These community-focused sites, which are driving the next generation of Web applications, are also becoming one of the juiciest targets for malicious hackers.

            Computers surfing the sites silently communicate with a Web application in the background, but hackers sometimes secretly embed malicious code when they edit the open sites, and a Web browser will unknowingly execute the code. These chinks in the armor could let hackers steal private data, hijack Web transactions or spy on users.

            Tuesday's forum gathers experts from around the globe to "try to get ahead of emerging threats rather than having to chase them," said Mustaque Ahamad, director of the Georgia Tech center.

            They are expected to discuss new countermeasures, including tighter validation standards and programs that analyze malicious code. Ahamad also hopes the summit will be a launching pad of sorts for an informal network of security-minded programmers.



            I already said all of this in Two (2) lousy sentences in the thread top post.

            What we are looking for is any info on the prevention and I wanted to make people aware of this new code.

            Damn You .....You BLEW IT UP.... Damn You all to Helllllll!@!!!!

            :fucku2:

            Comment

            • LoungeMachine
              DIAMOND STATUS
              • Jul 2004
              • 32576

              #7
              Yet you felt the need to quote the entire story I posted...

              Why?

              Why not post a story or a link when you start this thread?

              What's this "I heard today" bullshit?

              fucking hick.

              Originally posted by Kristy
              Dude, what in the fuck is wrong with you? I'm full of hate and I do drugs.
              Originally posted by cadaverdog
              I posted under aliases and I jerk off with a sock. Anything else to add?

              Comment

              • LoungeMachine
                DIAMOND STATUS
                • Jul 2004
                • 32576

                #8
                Originally posted by thome
                I already said all of this in Two (2) lousy sentences
                Well that goes without saying....

                Pretty much describes your entire time here....

                Originally posted by Kristy
                Dude, what in the fuck is wrong with you? I'm full of hate and I do drugs.
                Originally posted by cadaverdog
                I posted under aliases and I jerk off with a sock. Anything else to add?

                Comment

                • Diamondjimi
                  DIAMOND STATUS
                  • May 2004
                  • 12086

                  #9
                  Thanks for the paste Mr. Machine !
                  Trolls take heed...LOG OUT & FUCK OFF!!!

                  Comment

                  • BITEYOASS
                    ROTH ARMY ELITE
                    • Jan 2004
                    • 6530

                    #10
                    They need to confine all hackers to an Amish Village for forced labor. Lets see them try to hack with a quill and ink.

                    Comment

                    • thome
                      ROTH ARMY ELITE
                      • Mar 2005
                      • 6678

                      #11
                      If it doesn't paste it doesn't live.

                      If I not paste I lie..

                      I will do more research in the morning except for the work thing

                      Comment

                      • VanHalener
                        ROCKSTAR

                        • Nov 2006
                        • 5451

                        #12
                        Heard about this shite, uh huh.

                        I love MAC.

                        and now, I Wanna Rock....

                        <object width="425" height="350"><param name="movie" value="http://www.youtube.com/v/S6e8aOdPxhI"></param><param name="wmode" value="transparent"></param><embed src="http://www.youtube.com/v/S6e8aOdPxhI" type="application/x-shockwave-flash" wmode="transparent" width="425" height="350"></embed></object>

                        hackers....they do it in hard drive


                        please spare me Mr Hacker
                        Last edited by VanHalener; 10-06-2007, 05:46 AM.
                        ~Only you can prevent low volume~

                        Comment

                        Working...