How Movie Files Can Become The Source Of Malware Attacks

Apple’s latest security update for Mac OS X includes a series of patches to Quicktime designed to stop the movie playback software from being exploited to launch a malicious attack. How do you turn a non-executable movie into dangerous executable code?

Sophos security guru Paul Ducklin explains how the structure of MOV files makes them potentially vulnerable to stack overflow errors, and why this matters. It’s a detailed and interesting read, and worth checking out if you’re not familiar with how this kind of exploit works.

For programmers, there’s also a timeless reminder: “Remember that you can never have too much error-checking.” Hit the link for the full post.

Anatomy of a buffer overflow – learning from Apple’s latest security update [Naked Security]

The Cheapest NBN50 Plans

Here are the cheapest plans available for Australia’s most popular NBN speed tier.

At Lifehacker, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.


3 responses to “How Movie Files Can Become The Source Of Malware Attacks”