Feeds

Is that YouTube clip you just watched booby trapped?

Streaming malware

Top 5 reasons to deploy VMware with Tegile

Video clips from YouTube might come booby-trapped with malware, security watchers warn.

A fake video file containing the Zlob Trojan has been planted on the video-sharing site. If selected, the Trojan bombards infected users with ads. It might also be used to upload other forms of malware onto compromised PCs.

According to the California IT security firm Secure Computing, a lack of adequate content filtering by the Google subsidiary is exposing users to malware. "No one expects to find malware hidden in YouTube files," said Secure Computing's Paul Henry. "Yet the medium's popularity is highly alluring as a mass distribution vehicle for malicious code. What's alarming is that - from a security perspective - many users and organisations will be blindsided and potentially seriously exposed."

"Most of the leading firewalls are configured only to protect internal web servers, and not capable of blocking returned web code from external servers - which is the trend and certainly the direction this threat takes," he added.

Month of YouTube bugs

Separately, a white hat hacker complains about a lack of response from YouTube / Google developers after he warned them about security issues involving the site. Cross-site scripting vulns are among the unspecified vulnerabilities. The frustrated hacker says he is prepared to create a Day Of YouTube Bugs site where he'll release one or more vulnerabilities each hour - unless YouTube developers get in touch.

It's unclear if the vulnerabilities discussed on the sla.ckers.org forum are in any way related to the fake video malware threat. ®

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.