Welcome to WebmasterWorld Guest from 18.104.22.168
Forum Moderators: phranque
The e-mail security firm Proofpoint of Sunnyvale, Calif., and others caught these audio messages earlier this week in the dummy e-mail in-boxes, called honeypots, they use to trap new kinds of spam. The messages were blank but contained MP3 attachments of around 95 kilobytes — around the size of a cellphone ring tone. The attachments were audio files all pumping up the same penny stock.
This could be a virulent new form of unsolicited e-mail. Anti-spam companies like Proofpoint are not equipped to analyze the underlying audio and convert it back into text. But their filters can key off other indicators in the e-mail headers, e-mail structure and file size.
Audio Spam Files On The Way [bits.blogs.nytimes.com]
Thank god I don't open any attachments unless I know exactly where they are coming from.
To the best of my knowledge no one has ever been infected by a data file such as audio or video file. By virulent they meant that the technique would spread not that it posed any risk to a users computer. The only vulnetability I have ever heard of was a vulnerability reading the EXIF data from .jpg's. Some MS applications were affected, not sure if it was same vulnerability but php had one as well.
But this is getting OT...
I am sure they will catch all the audio files.
Who the heck will allow audio attachments though anyway?