Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Windows screen saver file.
It us being used to run malicious code when people run it.
Assuming he means screensavers, malware was once popularly spread through innoculus looking screensaver files.
Oh.
Wait, people still use screen savers? I thought we didn't need to use them anymore.
The filetype itself is harmless, however malicous files can exploit that file extension to auto-run on Windows machines and auto-download on some web-browsers. Most people don't care for screensavers anymore, also including Microsofts security team... They can hide them as an image file, which when attempting to open/disable as an image, it can executes the code instead as a trojan/virus injector.
More details about the one affected Steam:
http://steamcommunity.com/discussions/forum/12/620696522212248891/
I've already dealt with shutting down that website and it's domain, but others are likely to keep popping up.
'Outlook' also was vulnerable against them.
The funny thing is even NASA was affected by this exploit well in the past, and they haven't done anything to fix the security hole, except warn their staff to be more careful when opening image files and scr files in their email attachments and added a filter system *rolls eyes*.
" Please Dont Fall For These Scammers Please Always Look The File Format Before Opening Random File That Someone Send You!
First, you should remove the link before somebody actually clicks it.
Second, on those cases where the url seems to be an real image, use some web like longurl.org, which tell you where that link really redirects. I tried it with the link you received and, obviously, it's not a real .png, the web redirects to a google docs and google drive page with an option to directly download the file.