The number of ways that attackers can infect devices is incredible. One such method that has been around since at least 2003 involves inserting malicious code into the subtitle files used by media ...
AI thrives on data but feeding it the right data is harder than it seems. As enterprises scale their AI initiatives, they face the challenge of managing diverse data pipelines, ensuring proximity to ...
On Tuesday, security research firm Checkpoint announced that its team had discovered a new vulnerability in numerous media players that allows a hacker to take full control of any device when a ...
Better watch out where you download your subtitles from: It turns out attackers can infect subtitles with malicious code to exploit vulnerabilities in popular media players and take control of your ...
Researchers at Check Point have discovered a flaw affecting several popular media players, stemming from how they process subtitles. If exploited, an attacker could gain remote access to the victim’s ...
Researchers at Check Point Security Labs have uncovered a nasty new hacking technique that takes advantage security deficiencies in several popular media players. The exploit uses phony subtitle files ...
Be careful before you fire up media player software to play that foreign-language movie — it might be a way for intruders to compromise your system. Check Point researchers have discovered an exploit ...
A flaw in the widely-used open-source VLC media player could allow an attacker to execute harmful code on a PC. The problem stems from a buffer overflow that can occur when the player processes ...
VLC Media Player is a popular media player that is available for Windows, Mac, iOS, Apple TV, Android, and other platforms. It also allows users to upload the subtitle file directly to the player and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results