Skip to Content
Uncategorized

The JPEG of Death

Computer hackers have taken some pornographic JPEGs and augmented them with an exploit that uses the JPEG vulnerability that Microsoft recently announced, as reported by Computerworld. The exploit isn’t a virus, but instead turns the compromised computer into a bulk-mail…

Computer hackers have taken some pornographic JPEGs and augmented them with an exploit that uses the JPEG vulnerability that Microsoft recently announced, as reported by Computerworld. The exploit isn’t a virus, but instead turns the compromised computer into a bulk-mail spam machine, proof once again that the hackers and the spammers have teamed up.

What’s really neat about this exploit is that many people had long expected that the JPEG decompress routines, because of their complexity, almost certainly had to have some kind of buffer overflow in them. But it took literally years for someone to find it…

I went to Windows Update yesterday with a Windows 98 machine — a machine that Microsoft officially doesn’t support anymore. Nevertheless, Microsoft was more than happy to download the JPEG fix to me. Clearly, they are taking this one very seriously.

Once again, this is proof that every Windows machine being used to browse the Internet shoud have automatic updates on by default.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Google DeepMind’s new generative model makes Super Mario–like games from scratch

Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.