grumpy_cat@thelemmy.club to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 4 days agoGrandma we only use torrents for games, or to transfer things.thelemmy.clubimagemessage-square40fedilinkarrow-up1214arrow-down130
arrow-up1184arrow-down1imageGrandma we only use torrents for games, or to transfer things.thelemmy.clubgrumpy_cat@thelemmy.club to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 4 days agomessage-square40fedilink
minus-squareCassa@lemmy.blahaj.zonelinkfedilinkEnglisharrow-up2·3 days agono, these things would try to exploit the program that read them. it’s not a likely attack vector, you need both a malware file, and the right program trying to read it. it might not also be transferrable across different os. so yes, it needs a media player to attack. https://nvd.nist.gov/vuln/detail/CVE-2021-25801 this one f.ex
no, these things would try to exploit the program that read them.
it’s not a likely attack vector, you need both a malware file, and the right program trying to read it. it might not also be transferrable across different os.
so yes, it needs a media player to attack. https://nvd.nist.gov/vuln/detail/CVE-2021-25801 this one f.ex