Elmedia Player

Last updated
Elmedia Player
Developer(s) Electronic Team, Inc. [1]
Stable release
8.18(3409) / March 28, 2024;8 months ago (2024-03-28) [2]
Operating system OS X
Available inEnglish, Czech, Dutch, French, German, Italian, Japanese, Korean, Polish, Simplified Chinese, Spanish and Swedish
Type Media player
License Freeware [3]
Website www.elmedia-video-player.com

Elmedia Player is a freemium media player developed by Electronic Team, Inc. [4] Founded in 2000 as an alternative to QuickTime, it is offered for the macOS operation system. [5] According to the company, the software has 1 million users as of August 2017. [6]

Contents

Its developer, formerly known as Eltima Software, was founded in 2000 and based in US. [7]

On October 19, 2017, the free version of the media player was reported to have contained a malware trojan due to a security breach. [8] Vice reported that nearly 1,000 users downloaded compromised files. [9] Within a short time, the developers stopped the spread of this malware successfully.

Media formats

Elmedia is capable of playing the following formats:

In the July 2023 update, the developers integrated support for H.266/VVC standard, allowing VVC playback up to 8K. [12]

Elmedia Player also allows streaming to Chromecast, Smart TVs, Apple TV, Airplay, and DLNA-compatible devices [13] as well as mirroring iPhone/iPad screens. [14]

Related Research Articles

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

<span class="mw-page-title-main">ClamAV</span> Open-source antivirus software

ClamAV (antivirus) is a free software, cross-platform antimalware toolkit able to detect many types of malware, including viruses. It was developed for Unix and has third party versions available for AIX, BSD, HP-UX, Linux, macOS, OpenVMS, OSF (Tru64), Solaris and Haiku. As of version 0.97.5, ClamAV builds and runs on Microsoft Windows. Both ClamAV and its updates are made available free of charge. One of its main uses is on mail servers as a server-side email virus scanner.

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software vulnerabilities from spreading. The sandbox metaphor derives from the concept of a child's sandbox—a play area where children can build, destroy, and experiment without causing any real-world damage. It is often used to kill untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system. A sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as storage and memory scratch space. Network access, the ability to inspect the host system, or read from input devices are usually disallowed or heavily restricted.

Mobile malware is malicious software that targets mobile phones or wireless-enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware.

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hacks looking for specific information may only attack users coming from a specific IP address. This also makes the hacks harder to detect and research. The name is derived from predators in the natural world, who wait for an opportunity to attack their prey near watering holes.

Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer. It is a form of scareware that manipulates users through fear, and a form of ransomware. Rogue security software has been a serious security threat in desktop computing since 2008. An early example that gained infamy was SpySheriff and its clones, such as Nava Shield.

<span class="mw-page-title-main">Kaspersky Anti-Virus</span> Antivirus solution

Kaspersky Anti-Virus is a proprietary antivirus program developed by Kaspersky Lab. It is designed to protect users from malware and is primarily designed for computers running Microsoft Windows and macOS, although a version for Linux is available for business consumers.

<span class="mw-page-title-main">CCleaner</span> Suite of utilities for cleaning disk and operating system environment

CCleaner, developed by Piriform Software, is a utility used to clean potentially unwanted files and invalid Windows Registry entries from a computer. It is one of the longest-established system cleaners, first launched in 2004. It was originally developed for Microsoft Windows only, but in 2012, a macOS version was released. An Android version was released in 2014.

Man-in-the-browser, a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a covert fashion invisible to both the user and host web application. A MitB attack will be successful irrespective of whether security mechanisms such as SSL/PKI and/or two- or three-factor authentication solutions are in place. A MitB attack may be countered by using out-of-band transaction verification, although SMS verification can be defeated by man-in-the-mobile (MitMo) malware infection on the mobile phone. Trojans may be detected and removed by antivirus software, but a 2011 report concluded that additional measures on top of antivirus software were needed.

Form grabbing is a form of malware that works by retrieving authorization and log-in credentials from a web data form before it is passed over the Internet to a secure server. This allows the malware to avoid HTTPS encryption. This method is more effective than keylogger software because it will acquire the user’s credentials even if they are input using virtual keyboard, auto-fill, or copy and paste. It can then sort the information based on its variable names, such as email, account name, and password. Additionally, the form grabber will log the URL and title of the website the data was gathered from.

<span class="mw-page-title-main">Dr.Web</span> Antivirus software suite

Dr.Web is a software suite developed by Russian anti-malware company Doctor Web. First released in 1992, it became the first anti-virus service in Russia.

OSX.FlashBack, also known as the Flashback Trojan, Fakeflash, or Trojan BackDoor.Flashback, is a Trojan horse affecting personal computer systems running Mac OS X. The first variant of Flashback was discovered by antivirus company Intego in September 2011.

InstallCore was an installation and content distribution platform created by ironSource, including a software development kit (SDK) for Windows and Mac OS X. The program allowed those using it for distribution to include monetization by advertisements or charging for installation, and made its installations invisible to the user and its anti-virus software.

Cozy Bear is a Russian advanced persistent threat hacker group believed to be associated with Russian foreign intelligence by United States intelligence agencies and those of allied countries. Dutch signals intelligence (AIVD) and American intelligence had been monitoring the group since 2014 and was able to link the hacker group to the Russian foreign intelligence agency (SVR) after compromising security cameras in their office. CrowdStrike and Estonian intelligence reported a tentative link to the Russian domestic/foreign intelligence agency (FSB). Various groups designate it CozyCar, CozyDuke, Dark Halo, The Dukes, Midnight Blizzard, NOBELIUM, Office Monkeys, StellarParticle, UNC2452 with a tentative connection to Russian hacker group YTTRIUM. Symantec reported that Cozy Bear had been compromising diplomatic organizations and national governments since at least 2010. Der Spiegel published documents in 2023 purporting to link Russian IT firm NTC Vulkan to Cozy Bear operations.

macOS malware includes viruses, trojan horses, worms and other types of malware that affect macOS, Apple's current operating system for Macintosh computers. macOS is said to rarely suffer malware or virus attacks, and has been considered less vulnerable than Windows. There is a frequent release of system software updates to resolve vulnerabilities. Utilities are also available to find and remove malware.

Versatile Video Coding (VVC), also known as H.266, ISO/IEC 23090-3, and MPEG-I Part 3, is a video compression standard finalized on 6 July 2020, by the Joint Video Experts Team (JVET) of the VCEG working group of ITU-T Study Group 16 and the MPEG working group of ISO/IEC JTC 1/SC 29. It is the successor to High Efficiency Video Coding. It was developed with two primary goals – improved compression performance and support for a very broad range of applications.

The Silver Sparrow computer virus is malware that runs on x86- and Apple M1-based Macintosh computers. Engineers at the cyber security firm Red Canary have detected two versions of the malware in January and February 2021.

Cryptojacking is the act of exploiting a computer to mine cryptocurrencies, often through websites, against the user's will or while the user is unaware. One notable piece of software used for cryptojacking was Coinhive, which was used in over two-thirds of cryptojacks before its March 2019 shutdown. The cryptocurrencies mined the most often are privacy coins—coins with hidden transaction histories—such as Monero and Zcash.

References

  1. "USB over Ethernet Technology solutions by Electronic Team".
  2. "Elmedia Player from the Electronic Team website". Emilia Rudd. Retrieved March 28, 2024.
  3. "Elmedia Player Licenses".
  4. Thomson, Iain (2017-10-20). "Malware hidden in vid app is so nasty, victims should wipe their Macs". The Register . Retrieved 2024-03-02.
  5. Calderone, Nicholas (2022-05-27). "Elmedia Player For Mac 2022 REVIEW". MacSources. Retrieved 2024-03-02.
  6. Bookwalter, J.R. (2016-02-02). "Elmedia Player Pro review: Better, stronger, faster than QuickTime Player". Macworld . Retrieved 2024-03-02.
  7. Calderone, Nicholas (2022-05-27). "Elmedia Player For Mac 2022 REVIEW". MacSources. Retrieved 2024-03-02.
  8. Palmer, Danny (2017-10-20). "Mac OSX Trojan malware spread via compromised software downloads". ZDNet . Retrieved 2024-03-02.
  9. Constantin, Lucian (2017-10-20). "Hackers Distribute Malware-Infected Media Player to Hundreds of Mac Users". Vice . Retrieved 2024-03-02.
  10. Rudd, Emilia. "Elmedia Supported Formats | KB". Electronic Team, Inc. Retrieved 2024-03-29.
  11. "13 Best FREE Video (Media) Player for Mac (2024 Update)". www.guru99.com. 2024-03-09. Retrieved 2024-03-29.
  12. "Fraunhofer HHI and Electronic Team demonstrate how VVC technology provides a greatly enhanced multimedia experience". www.hhi.fraunhofer.de. Retrieved 2024-03-29.
  13. Brookes, Tim (2022-10-05). "How to Connect a Laptop to a TV". How-To Geek. Retrieved 2024-03-29.
  14. "The Best iTunes Alternatives for Mac". Digital Trends. 2021-03-10. Retrieved 2024-03-29.