Content
Editorial
Events
News
Contact Us
Faith
Health
Bollywood
Fashion
Mental Health
Immigration
Financial advice
Youth Matters
Seniors
Techno Corner
Arts
Astrology
Books
Cuisine
Home
Archives
Classifieds
 


Arun Marballi
POPULAR CLASSES OF SOFTWARE MEDIA PLAYERS AND MESSENGER USERS VULNERABLE
By ARUN MARBALLI

Last month, we examined how hackers were starting to target widely used software that is not part of the operating system or related to the browser, such as the anti-virus software that we rely on for protecting our computers. This month, I will expand the scrutiny to include a couple of other classes of software that are rapidly gaining popularity.

The first of the popular classes of software are the content providers that support the iPods and other MP3 Players that have gained such a tremendous following. Recently discovered flaws in Apple�s iTunes and Quicktime enable a hacker to break into a computer, and the ubiquity of this class of software illustrates the extent of exposure that prevails in the computing universe � and most people who use this software are probably not even aware of it.

The seriousness of this problem is compounded by the fact that vendors of these software products have not yet fully and reliably addressed the situation. Until dependable fixes for these flaws are made available, the recommendation that media files (especially files that have a .mov extension) be accessed with caution should be heeded.

Further, it is important that we make an effort to get the latest update for all media players installed on our computers. The popular media software are Real Player, Apple Quicktime and Windows Media Player. One way to find out which players are installed on our computers is to access the �Add/Remove Programs� option from the Control Panel window and review the installed programs.

Driven by the popularity of text messaging as the communication style of choice amongst teens and young adults, classes of software that support this mode of communication such as AIM and other Messenger services have understandably gained attractiveness as well.

As is to be expected, increasing use has attracted hackers to this medium in the hope of catching someone off guard and perhaps achieving some monetary gains. Earlier this month, there were reports of unsolicited text messages received via the AIM Messenger service instructing the message recipient to click the site http://FlyAway.mygamesite.net/pics.php.

Users beware that this site is an AIM Worm that attempts to download spyware (a class of software that I will address next month) to the users� machine and then proceeds to send out the same message to all members of the users� Buddy List. In other words, you might receive this message looking like it came from one of your �Buddies.� As in the case of �phishing� e-mails the prudent course of action is to call the �Buddy� and confirm the authenticity of the message.

Arun Marballi has worked in the Information Technology arena for more than 20 years with extensive experience in software development, process design and network/workstation management. For comments, questions, tips or suggestions, e-mail [email protected].

Home



Contact Information
The Editor: [email protected]
Advertising: [email protected]
Webmaster: [email protected]
Send mail to [email protected] with questions or comments about this web site. Copyright � 2004 Khaas Baat.

Anything that appears in Khaas Baat cannot be reproduced, whether wholly or in part, without permission. Opinions expressed by Khaas Baat contributors are their own and do not reflect the publisher's opinion.

Khaas Baat reserves the right to edit and/or reject any advertising. Khaas Baat is not responsible for errors in advertising or for the validity of any claims made by its advertisers. Khaas Baat is published by Khaas Baat Communications.