www.bleepingcomputer.com Open in urlscan Pro
104.20.59.209  Public Scan

URL: https://www.bleepingcomputer.com/forums/t/574487/is-it-possible-for-a-virus-to-be-embedded-in-a-image/
Submission: On January 19 via manual from US — Scanned from DE

Form analysis 3 forms found in the DOM

POST https://www.bleepingcomputer.com/forums/index.php?app=core&module=search&do=search&fromMainBar=1

<form action="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=search&amp;do=search&amp;fromMainBar=1" method="post" id="search-box">
  <fieldset>
    <label for="main_search" class="hide">Search</label>
    <a href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=search&amp;search_in=forums" title="Advanced Search" accesskey="4" rel="search" id="adv_search" class="right">Advanced</a>
    <span id="search_wrap" class="right">
      <input type="text" id="main_search" name="search_term" class="" size="17" tabindex="100" placeholder="Search...">
      <span class="choice ipbmenu clickable" id="search_options" style="">This topic</span>
      <ul id="search_options_menucontent" class="ipbmenu_content ipsPad" style="display: none; position: absolute; z-index: 9999;">
        <li class="title" style="z-index: 10000;"><strong style="z-index: 10000;">Search section:</strong></li>
        <li class="special" style="z-index: 10000;">
          <label for="s_topic" title="This topic" style="z-index: 10000;">
            <input type="radio" name="search_app" value="forums:topic:574487" class="input_radio" id="s_topic" checked="checked" style="z-index: 10000;"><strong style="z-index: 10000;">This topic</strong>
          </label>
        </li>
        <li class="app" style="z-index: 10000;"><label for="s_forums" title="Forums" style="z-index: 10000;"><input type="radio" name="search_app" class="input_radio" id="s_forums" value="forums" style="z-index: 10000;">Forums</label></li>
        <li class="app" style="z-index: 10000;"><label for="s_members" title="Members" style="z-index: 10000;"><input type="radio" name="search_app" class="input_radio" id="s_members" value="members" style="z-index: 10000;">Members</label></li>
        <li class="app" style="z-index: 10000;"><label for="s_core" title="Help Files" style="z-index: 10000;"><input type="radio" name="search_app" class="input_radio" id="s_core" value="core" style="z-index: 10000;">Help Files</label></li>
        <li class="app" style="z-index: 10000;">
          <label for="s_calendar" title="Calendar" style="z-index: 10000;">
            <input type="radio" name="search_app" class="input_radio" id="s_calendar" value="calendar" style="z-index: 10000;">Calendar </label>
        </li>
      </ul>
      <input aria-label="Search the forum" type="submit" class="submit_input clickable" value="">
    </span>
  </fieldset>
</form>

POST https://www.bleepingcomputer.com/forums/index.php?

<form id="modform" method="post" action="https://www.bleepingcomputer.com/forums/index.php?">
  <input type="hidden" name="app" value="forums">
  <input type="hidden" name="module" value="moderate">
  <input type="hidden" name="section" value="moderate">
  <input type="hidden" name="do" value="postchoice">
  <input type="hidden" name="f" value="45">
  <input type="hidden" name="t" value="574487">
  <input type="hidden" name="auth_key" value="880ea6a14ea49e853634fbdc5015a024">
  <input type="hidden" name="st" value="">
  <input type="hidden" name="page" value="">
  <input type="hidden" value="" name="selectedpidsJS" id="selectedpidsJS">
  <input type="hidden" name="tact" id="tact" value="">
</form>

POST https://www.bleepingcomputer.com/forums/index.php?app=core&module=global&section=login&do=process

<form action="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;do=process" method="post" id="login">
  <input type="hidden" name="auth_key" value="880ea6a14ea49e853634fbdc5015a024">
  <input type="hidden" name="referer" value="https://www.bleepingcomputer.com/forums/t/574487/is-it-possible-for-a-virus-to-be-embedded-in-a-image/">
  <h3>Sign In</h3>
  <div class="ipsBox_notice">
    <ul class="ipsList_inline">
      <li>
        <a href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;serviceClick=twitter" class="ipsButton_secondary"><img src="https://www.bleepingcomputer.com/forums/public/style_images/master/loginmethods/twitter.png" alt="Twitter"> &nbsp; Use Twitter</a>
      </li>
    </ul>
  </div>
  <br>
  <div class="ipsForm ipsForm_horizontal">
    <fieldset>
      <ul>
        <li class="ipsField">
          <div class="ipsField_content"> Need an account? <a href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=register" title="Register now!">Register now!</a>
          </div>
        </li>
        <li class="ipsField ipsField_primary">
          <label for="ips_username" class="ipsField_title">Username</label>
          <div class="ipsField_content">
            <input id="ips_username" type="text" class="input_text" name="ips_username" size="30" tabindex="0">
          </div>
        </li>
        <li class="ipsField ipsField_primary">
          <label for="ips_password" class="ipsField_title">Forum Password</label>
          <div class="ipsField_content">
            <input id="ips_password" type="password" class="input_text" name="ips_password" size="30" tabindex="0"><br>
            <a href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=lostpass" title="Retrieve password">I've forgotten my password</a>
          </div>
        </li>
        <li class="ipsField ipsField_checkbox">
          <input type="checkbox" id="inline_remember" checked="checked" name="rememberMe" value="1" class="input_check" tabindex="0">
          <div class="ipsField_content">
            <label for="inline_remember">
              <strong>Remember me</strong><br>
              <span class="desc lighter">This is not recommended for shared computers</span>
            </label>
          </div>
        </li>
        <li class="ipsField ipsField_checkbox">
          <input type="checkbox" id="inline_invisible" name="anonymous" value="1" class="input_check" tabindex="0">
          <div class="ipsField_content">
            <label for="inline_invisible">
              <strong>Sign in anonymously</strong><br>
              <span class="desc lighter">Don't add me to the active users list</span>
            </label>
          </div>
        </li>
        <li class="ipsPad_top ipsForm_center desc ipsType_smaller">
          <a rel="nofollow" href="https://www.bleepingcomputer.com/forums/privacypolicy/">Privacy Policy</a>
        </li>
      </ul>
    </fieldset>
    <div class="ipsForm_submit ipsForm_center">
      <input type="submit" class="ipsButton" value="Sign In" tabindex="0">
    </div>
  </div>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products.

With your permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may access more
detailed information and change your preferences before consenting or to refuse
consenting. Please note that some processing of your personal data may not
require your consent, but you have a right to object to such processing. Your
preferences will apply to this website only. You can change your preferences at
any time by returning to this site or visit our privacy policy.

MORE OPTIONSAGREE

 *      Sign In   
 * Create Account

Search Advanced This topic
 * Search section:
 * This topic
 * Forums
 * Members
 * Help Files
 * Calendar

 *  
 * View New Content
 * Forum Rules
 * BleepingComputer.com
 * Forums
 * Members
 * Tutorials
 * Startup List
 * Virus Removal
 * Downloads
 * Uninstall List
 * Welcome Guide
 * More

 1. BleepingComputer.com
 2. → Security
 3. → General Security


Javascript Disabled Detected

You currently have javascript disabled. Several functions may not work. Please
re-enable javascript to access full functionality.


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come
together to discuss and learn how to use their computers. Using the site is easy
and fun. As a guest, you can browse and view the various discussions in the
forums, but can not create a new topic or reply to an existing one unless you
are logged in. Other benefits of registering an account are subscribing to
topics and forums, creating a blog, and having no ads shown anywhere on the
site.


Click here to Register a free account now! or read our Welcome Guide to learn
how to use this site.


Latest News:    Windows Server 2019 OOB update fixes reboots, Hyper-V, ReFS bugs

Featured Deal: Get 40% off this bundle of popular Mac utilities and tools




IS IT POSSIBLE FOR A VIRUS TO BE EMBEDDED IN A IMAGE?

Started by SuperSapien64 , Apr 26 2015 05:51 PM

 * Page 1 of 3
 * 1
 * 2
 * 3

 * Next

 * Please log in to reply

32 replies to this topic


#1 SUPERSAPIEN64

SuperSapien64
   
   
 * 
 * Members
 * 1,937 posts
 * OFFLINE

 * Gender:Male
 * Local time:11:16 PM

Posted 26 April 2015 - 05:51 PM

This one question which I've always pondered about can a virus be embedded in a
image (jpg,gif,png,etc)? I know a worm could but what about a Trojan or other
malware? Part of the reason I ask is because my brother has a bunch of images on
his Android phone and I would like to know the chances of him becoming infected
with malware from the images he downloaded?


Avatar/Icon by https://www.deviantart.com/dablim/gallery

 * Back to top

--------------------------------------------------------------------------------


BC ADBOT (LOGIN TO REMOVE)

 * 
 * BleepingComputer.com
 * 
 * Register to remove ads


PLAY Top Articles Video Settings Full Screen About Connatix V146288 Read More
Read More Read More Read More Read More Read More Windows Server 2019 OOB update
fixes reboots,Hyper‑V, ReFS bugs 1/1 Skip Ad Continue watching after the ad
Visit Advertiser website GO TO PAGE



 

--------------------------------------------------------------------------------


#2 MINXY MOO

Minxy Moo
   
   
 * 
 * Members
 * 19 posts
 * OFFLINE

 * Gender:Female
 * Local time:06:16 AM

Posted 26 April 2015 - 06:04 PM

I think anything you download can have a virus attached to it. I'm no expert
though! 


 * Back to top

--------------------------------------------------------------------------------


#3 AURA

Aura

   Bleepin' Special Ops

   
   
 * 
 * Malware Response Team
 * 19,707 posts
 * OFFLINE

 * Gender:Male
 * Local time:01:16 AM

Posted 26 April 2015 - 06:04 PM

Hi SuperSapien64

Yes, it's possible for a malware to be embedded in a picture file. Or it's
possible for a picture file to be specially crafted in order to be infected.
Someone explained that concept in the thread below, if you want to take a look
at it.

This looks new and slipped by the Gmail filters this morning.

I guess that one of our Security Experts here like Didier or Mike could tell you
more about that practice




Security Administrator | Sysnative Windows Update Senior Analyst | Malware
Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours,
please send me a PM.

 * Back to top

--------------------------------------------------------------------------------


#4 SUPERSAPIEN64

SuperSapien64
 * Topic Starter
   
   
 * 
 * Members
 * 1,937 posts
 * OFFLINE

 * Gender:Male
 * Local time:11:16 PM

Posted 26 April 2015 - 09:08 PM

Aura., on 26 Apr 2015 - 11:04 PM, said:

> Hi SuperSapien64
> 
> Yes, it's possible for a malware to be embedded in a picture file. Or it's
> possible for a picture file to be specially crafted in order to be infected.
> Someone explained that concept in the thread below, if you want to take a look
> at it.
> 
> This looks new and slipped by the Gmail filters this morning.
> 
> I guess that one of our Security  Experts here like Didier or Mike could tell
> you more about that practice

Yes I'm aware of that method it can be used with almost any media or document
file like a PDF for example. But I'm curious if its possible to script malicious
code the same its possible for a text file to have malicious scripts since
PNG,GIF and TIFs all support transparent layers wouldn't be possible to embed
code in the transparent layers and exploiting variabilities in a operating
system?

I hope I'm not opening Pandora's box by mentioning this concept.


Edited by SuperSapien64, 26 April 2015 - 09:09 PM.

Avatar/Icon by https://www.deviantart.com/dablim/gallery

 * Back to top

--------------------------------------------------------------------------------


#5 AURA

Aura

   Bleepin' Special Ops

   
   
 * 
 * Malware Response Team
 * 19,707 posts
 * OFFLINE

 * Gender:Male
 * Local time:01:16 AM

Posted 26 April 2015 - 09:11 PM

Yes its possible to have an image embedded with malicious code that will be
executed by the program in which it could be open. See the reply to this
question here:

http://security.stackexchange.com/questions/55061/can-malware-be-attached-to-an-image

Security Updates are being released for programs that could be exploited by
these methods, so its a threat that exists and is considered as dangerous by
software' authors.




Security Administrator | Sysnative Windows Update Senior Analyst | Malware
Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours,
please send me a PM.

 * Back to top

--------------------------------------------------------------------------------


#6 QUIETMAN7

quietman7

   Bleepin' Gumshoe

   
   
 * 
 * Global Moderator
 * 59,027 posts
 * OFFLINE

 * Gender:Male
 * Location:Virginia, USA
 * Local time:12:16 AM

Posted 26 April 2015 - 09:21 PM

Quote

> There are some cases where pictures can in fact carry viruses, but once again
> even that is extremely rare. Typically, a virus-carrying picture must be
> created by someone with malicious intent, so they're not going to infect
> existing photos. When they first appeared they were placed on websites so that
> visitors would be infected...The other picture-related vector for virus
> propagation is a picture that's not a picture...there's nothing that says a
> ".jpg" file needs to actually contain a picture...Depending on how it's done,
> and how up to date your system is, it's possible for a virus to masquerade as
> a picture. If you attempt to view the picture, you get a virus instead.

Can a virus be transmitted in a picture?

 

Quote

> ...digital steganography...Malware authors can employ this technique to
> conceal malicious code in otherwise normal looking media files like images,
> without arousing any suspicion...digital steganography means that even
> everyday images encountered on the web are not above suspicion...

How Digital Steganography Hides Malware

Attackers are resourceful individuals but they typically look for methods that
offer a stealthy way to distribute malware to a wide range of Internet users.
Image files are not really an effective way to accomplish that goal because in
an image format malicious code cannot be easily executed and distributed. While
there have been proof-of-concept virus reports of such infections, they are rare
and certainly not widespread. What we more commonly see is a disguised malicious
executable containing viral code which has been created and renamed .jpg so that
it masquerades as a picture.


.
.
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click

 * Back to top

--------------------------------------------------------------------------------


#7 WHITE HAT MIKE

White Hat Mike
   
   
 * 
 * Members
 * 312 posts
 * OFFLINE

 * Gender:Male
 * Location:::1
 * Local time:01:16 AM

Posted 27 April 2015 - 07:13 AM

SuperSapien64, on 27 Apr 2015 - 02:08 AM, said:

>  
> 
> Aura., on 26 Apr 2015 - 11:04 PM, said:
> 
> > Hi SuperSapien64
> > 
> > Yes, it's possible for a malware to be embedded in a picture file. Or it's
> > possible for a picture file to be specially crafted in order to be infected.
> > Someone explained that concept in the thread below, if you want to take a
> > look at it.
> > 
> > This looks new and slipped by the Gmail filters this morning.
> > 
> > I guess that one of our Security  Experts here like Didier or Mike could
> > tell you more about that practice
> 
> Yes I'm aware of that method it can be used with almost any media or document
> file like a PDF for example. But I'm curious if its possible to script
> malicious code the same its possible for a text file to have malicious scripts
> since PNG,GIF and TIFs all support transparent layers wouldn't be possible to
> embed code in the transparent layers and exploiting variabilities in a
> operating system?
> 
> I hope I'm not opening Pandora's box by mentioning this concept.
> 
>  

 

Extremely unlikely, especially today.  Theoretically, it's possible, but a true
image file that delivers malicious content is unlikely; I don't think this is
something that you should be concerned about or spend much time pondering.
 However, attackers can and do use images for many different things.  For
example, embedding an [invisible] image into a website or an e-mail with a
source URL of an attacker's web page along with unique parameters to identify
the user.  Often used for statistical purposes, and for tracking targets.  An
example of steganography could be an attacker planting payload code / other
instructions within an image, then obfuscating/encrypting/or encoding the image,
only to deobfuscate/decrypt/decode it upon the page's loading and extract the
planting code/instructions from the source.


Information Security Engineer | Penetration Tester | Forensic Analyst

CipherTechs.com

 * Back to top

--------------------------------------------------------------------------------


#8 DIDIER STEVENS

Didier Stevens
   
   
 * 
 * BC Advisor
 * 2,986 posts
 * OFFLINE

 * Gender:Not Telling
 * Local time:06:16 AM

Posted 27 April 2015 - 09:35 AM

SuperSapien64, on 26 Apr 2015 - 10:51 PM, said:

> This one question which I've always pondered about can a virus be embedded in
> a image (jpg,gif,png,etc)? I know a worm could but what about a Trojan or
> other malware? Part of the reason I ask is because my brother has a bunch of
> images on his Android phone and I would like to know the chances of him
> becoming infected with malware from the images he downloaded?

 

I'm a bit confused by your statement. You say a worm can, but you wonder about a
virus or trojan.

 

I call all malicious software malware.

Typically, a virus is defined as malware that propagates but needs user
interaction to propagate.

A worm, on the other hand, propagates but does not need user interaction.

 

What is your example of a worm that propagates via embedding in images?


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Senior Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2022


 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage
in a conversation, but try to answer your question in the relevant forum post.
If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of
a reference to BadUSB approaches 1.0"

 * Back to top

--------------------------------------------------------------------------------


#9 RP88

rp88
   
   
 * 
 * Members
 * 3,445 posts
 * OFFLINE

 * Gender:Not Telling
 * Local time:05:16 AM

Posted 27 April 2015 - 12:37 PM

From what I've heard, in the cases of steganography the image is not actually
dangerous in the normal sense, you could download the image without risk BUT if
you run any exe files by the image's evil author then those exe files, will find
that image and use it's code to inform themselves of what to do next. The virus
arrives in two parts, an executable part (which might execute by driveby, by
exploiting a program or by tricking the user into running it) and an image
(which secretly holds instrcutions for the executing part). That means the
executing part can't set off antivirus scanners because it isn't doing anything
malicious (it's just following orders to "find the image example.jpg, read the
steganographic code hidden in it and then do what that code tells it"), the
malicious orders are hidden within the image, but they can't do anything without
the executable running and reading the malicious instrcutions.

In the case of images designed to exploit software, and then run malicious code
themselves, the image is dangerous alone, because it is able to execute itself,
due to bugs in the software which is used to open it. Theoretically it should be
impossible for an image to be a virus, images are non-executable code, they
don't give instructions telling computers what to do, they should just get read
by image viewing software and then the image viewing program turns their code
into a pattern on screen. BUT because nobody's programming is ever perfect all
real world image viewing programs have a chance of having flaws in their code,
mistakes in their design meaning that it is possible for certain codes to cause
them to act strangely. Think of an image viewing program as being a black box,
in goes a string of data read from the image file, out comes a pattern of pixels
on screen, and what if this box had a mistake in it's design that if the code
"d0dgy-c0d3" ever gets read in the input string of data then the box decides to
treat all further instructions as being orders for actions, not just code for
pixels. An attacker could make a specially crafted image file with the code
"d0dgy-c0d3" in it's data somewhere and after that a series of malicious
instructions. Then when the data of the image file goes into the black box of
the software it reads the pixels as usual, then it reads the code "d0dgy-c0d3"
and after that it treats ubsequent code as executable rather than as beng the
pixels of an image, and the attacker now has whatever code he wrote after the
line "d0dgy-c0d3" running as an executable on the victims computer. This is why
image viewing/editing software needs updates every so often to patch it and stop
malicious images from being able to run code. If you look back over the
description pages of security updates which windows has released over the last
few months you'll notice some of them are to deal with specially crafted jpg ad
png images, those updates are designed to make sure that image viewing programs
within windows and IE do not treat code that confuses them as being executable.
Fortunately, because it is much harder for attackers to find the necesary bugs
in image viewing programs than it is for them to spread viruses by tricking
people into running exe files which the user thinks are images (see next
paragraph), this sort of attack is fairly rare.

The other thing to consider is images wth faked double extensions. Imagine a
file called picture1.jpg.exe , most users would not see the second extension
because (unless you change it's setting to "display full file extensions even
for known file types" within folder options, you should change this setting
now)windows would only show the first extension. On top of that many users might
not even realise the significance of different file extension types, so even if
they did see this they might not realise that the file is dangerous. The second
extension is the real extension, but as most users would only see the first, and
might even then not realise what it means, users would open the exe file
thinking it was a picture, and get a horrible shock when it turned out to be a
program in disguise.

In the case of your brother's phone I think images are the least likely way for
it to get infected, more probable causes are: drivebys and malvertising,
malicious apps (pretending to be legitimate) which somehow snuck into the
relevant app store, malicious apps(pretending to be legitimate) sideloaded from
outside the app store, a virus getting onto it when it was plugged into an
infected device via connection cable. Even though images are not a likely way
for the virus to have arrived I would still suggest it is not safe to copy the
images off of the phone onto a computer because although the images might be
perfectly safe the act of connecting a potentially infected phone to a computer
might well be enough for the phone to infect the computer by autorun/autoplay
type methods.


Edited by rp88, 27 April 2015 - 12:42 PM.

Back on this site, for a while anyway, been so busy the last year.

My systems:2 laptops, intel i3 processors, windows 8.1 installed on the
hard-drive and linux mint 17.3 MATE installed to USB
 * Back to top

--------------------------------------------------------------------------------


#10 SUPERSAPIEN64

SuperSapien64
 * Topic Starter
   
   
 * 
 * Members
 * 1,937 posts
 * OFFLINE

 * Gender:Male
 * Local time:11:16 PM

Posted 28 April 2015 - 05:11 PM

In other words its impractical from both a developmental and strategical
standpoint. And methods like steganography would be more commonly used in
espionage so the average user doesn't have to be concerned with this.
Thanks for explaining this in detail I feel a lot more relaxed about this and it
helps eliminate possibilities for any Trojans (excluding freeware apps) on my
brothers smartphone.


Avatar/Icon by https://www.deviantart.com/dablim/gallery

 * Back to top

--------------------------------------------------------------------------------


#11 QUIETMAN7

quietman7

   Bleepin' Gumshoe

   
   
 * 
 * Global Moderator
 * 59,027 posts
 * OFFLINE

 * Gender:Male
 * Location:Virginia, USA
 * Local time:12:16 AM

Posted 28 April 2015 - 05:16 PM

You're welcome on behalf of the Bleeping Computer community.

If you have not done so already, you may want to read: Answers to common
security questions - Best Practices for Safe Computing


.
.
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click

 * Back to top

--------------------------------------------------------------------------------


#12 GMER99

Gmer99
   
   
 * 
 * Members
 * 75 posts
 * OFFLINE

 * Gender:Male
 * Location:Europe
 * Local time:07:16 AM

Posted 28 April 2015 - 05:23 PM

If you download that image from torrents or your winrar archive is infected when
you unzip the files you could have a hidden virus in that image !!!

Avoid torrents and avoid windows with a bunch of crap software to install after
windows is installed , those all in one software comes with hidden viruses you
will never suspect ...Cyber criminals hide backdoors in those software so they
will know fast if your pc is calling them to be ready for attack.


 * Back to top

--------------------------------------------------------------------------------


#13 AURA

Aura

   Bleepin' Special Ops

   
   
 * 
 * Malware Response Team
 * 19,707 posts
 * OFFLINE

 * Gender:Male
 * Local time:01:16 AM

Posted 28 April 2015 - 05:24 PM

Quote

> avoid windows with a bunch of crap software to install after windows is
> installed


You mean, OEM preinstalled version of Windows by manufacturers?




Security Administrator | Sysnative Windows Update Senior Analyst | Malware
Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours,
please send me a PM.

 * Back to top

--------------------------------------------------------------------------------


#14 QUIETMAN7

quietman7

   Bleepin' Gumshoe

   
   
 * 
 * Global Moderator
 * 59,027 posts
 * OFFLINE

 * Gender:Male
 * Location:Virginia, USA
 * Local time:12:16 AM

Posted 28 April 2015 - 05:41 PM

The practice of using any torrent, file sharing, peer-to-peer (P2P) program or
visiting such sites is a security risk which can make your system susceptible to
a smörgåsbord of malware infections, remote attacks, exposure of personal
information, and identity theft.
 * File Sharing (P2P), Torrents, Keygens, Cracks, Warez, and Pirated Software
   are a Security Risk


.
.
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click

 * Back to top

--------------------------------------------------------------------------------


#15 SUPERSAPIEN64

SuperSapien64
 * Topic Starter
   
   
 * 
 * Members
 * 1,937 posts
 * OFFLINE

 * Gender:Male
 * Local time:11:16 PM

Posted 28 April 2015 - 07:25 PM

quietman7, on 28 Apr 2015 - 10:41 PM, said:

> The practice of using any torrent, file sharing, peer-to-peer (P2P) program or
> visiting such sites is a security risk which can make your system susceptible
> to a smörgåsbord of malware infections, remote attacks, exposure of personal
> information, and identity theft.
> 
>  * File Sharing (P2P), Torrents, Keygens, Cracks, Warez, and Pirated Software
>    are a Security Risk
> 
>  

Even Linux or Android can become infested with malware when using P2P clients
which is why I always uninstall them on Linux. But makes me wonder why do they
even come pre-installed on so many Linux distros?


Avatar/Icon by https://www.deviantart.com/dablim/gallery

 * Back to top

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

 * Page 1 of 3
 * 1
 * 2
 * 3

 * Next

Back to General Security

 * 
 * 
   
   
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 


1 USER(S) ARE READING THIS TOPIC

0 members, 1 guests, 0 anonymous users

Reply to quoted posts     Clear    




 1. BleepingComputer.com
 2. → Security
 3. → General Security
 4. Privacy Policy
 5. Rules ·

 * 
 * Help

Advertise   |   About Us   |   Terms of Use   |   Privacy Policy   |   Sitemap
  |   Chat   |   RSS Feeds   |   Contact Us Tech Support Forums   |   Virus
Removal Guides   |   Downloads   |   Tutorials   |   The Computer Glossary   |  
Uninstall List   |   Startups   |   The File Database


© 2004-2022 All Rights Reserved Bleeping Computer LLC .
Site Changelog


Community Forum Software by IP.Board


SIGN IN

 *   Use Twitter


 * Need an account? Register now!
 * Username
   
 * Forum Password
   
   I've forgotten my password
 * Remember me
   This is not recommended for shared computers
 * Sign in anonymously
   Don't add me to the active users list
 * Privacy Policy




JUMP TO PAGE




JUMP TO PAGE