Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works

HUGE Vulnerability

  • Please log in to reply




  • Member
  • PipPip
  • 31 posts



Have you ever had a time where you are on Skype and someone sends you a .jpg and you can already see the picture? Guess what, what you didn't know is that Skype automatically executes the .jpg and saves it locally without you even pressing anything. You may be asking, how is that a issue? Well, if a attacker has a good encrypting program, all he/she has to do is spoof their trojan, worm, etc, into a .jpg. So, what that does is it basically looks like a .jpg but it runs as a .exe. What is the bad part about this is that Skype normally saves and executes the file without you even asking, so if a person sends you a spoofed file, skype runs and saves it and you are infected without you even clicking anything. I just wanted to warn the community about this as I got this information from another forum where someone was posting and bragging about how many people they infected. That being said, I take NO credit for finding this, but simply reporting what I saw on another forum!

Edited by anthonybugg, 02 January 2015 - 11:58 PM.

  • 0


Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP