Keeping a vigil on viruses

By on

Last year a flaw in the way Microsoft applications process JPEG image files caused widespread alarm. The exploits could create a jpeg file formatted to trigger an overflow in a common Windows component and open a command shell on a vulnerable Windows system.

This, in itself, would not be not damaging. It was the fact that it would be a relatively simple step for a knowledgeable remote attacker to then add malicious commands to the script and potentially take full control of vulnerable systems that caused so much concern. To be at risk, users of ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?