Author Topic: What is JPEG Exploit and how it works  (Read 2727 times)

0 Members and 1 Guest are viewing this topic.

What is JPEG Exploit and how it works
« on: December 02, 2010, 01:20:26 AM »

Offline Nick

  • Administrator
  • Platinum Member
  • *
  • Posts: 46028
  • Karma: +1000/-0
  • Gender: Male
  • NickCS
    • http://www.facebook.com/nickcomputerservices
    • http://www.twitter.com/nickcomputer
    • Computer Chiangmai

Microsoft’s unpatched system that is the systems that are not having the security patches installed were exposed to these risks called JPEG Exploits.

JPEG Exploit is a way of attacking the system with a malware in which a malware is converted into a JPEG file which when run using the Microsoft’s default Picture and Fax viewer activates the malware. The malware in turn downloads the suspicious files in the background thereby attacking the system.

Malformed JPEG files are capable of triggering a buffer overflow in a common Windows component. To safeguard against these risks follow the steps as listed below:

1. Never open a suspicious file if it is linked to a jpeg image.

2. Keep your systems updated to the latest OS and the patches released.

3. Installing the latest security updates for different applications keep the system protected.

4. You may also use third party image viewers for viewing the image files.

5. Keep your anti-malware updated and run a complete scan every 10 days.


 
Share this topic...
In a forum
(BBCode)
In a site/blog
(HTML)


Related Topics

  Subject / Started by Replies Last post
0 Replies
2006 Views
Last post June 16, 2010, 06:12:21 PM
by Nick
0 Replies
8577 Views
Last post September 25, 2014, 04:07:15 PM
by Nick