QuickTime is turned into super-keylog
On December 20, Apple Computer released an upgrade to patch a serious security bug in the QuickTime multimedia application.
The application developer said this error could be exploited by hackers to turn QuickTime into a super-keyloglog to steal user information.
Hackers can embed a malicious Java Applet on the web and use it with the QuickTime for Java application to take a screenshot of the user's PC screen and send it to them.
If the above attack method is used in conjunction with Apple Quartz Composer, it will become an advanced screen capture method capable of capturing information on demand.
The above security error stems from a security error in QuickTime for Java. However, this security error only affects the QuickTime version for Mac OS X. The version for Windows does not make the mistake.
Users can go to the Apple website to download the latest patch.
Hoang Dung
- Apple QuickTime RTSP buffer overflow
- QuickTime bug threatens XP, Vista
- Keyboard character detectors spread in more than 50 countries
- Apple patches serious security in QuickTime
- QuickTime 'abetted' hackers to attack users
- Apple patches new 'deadly' for QuickTime
- Before the Typhoon Hagibis landed, the sky of Japan suddenly turned strangely purple
- Super strong storm has avoided Vietnam
- 'Super monster monster' blew away the ocean of 1 planet
- Haiyan storm turned to Thanh Hoa
- The 10 biggest storms recorded in history
- Surf the web more safely with anti-Keylog software