An important element of a kernel rootkit is its ability to hide itself and cover up what is really going on. Here’s one way that some rootkits do that. When a rootkit is installed, it replaces certain ...
These attacker tools have become stealthier than ever. Even so, they may not require specialized protection. Talk of , favorite attacker tools for compromising computer systems without detection, has ...
A rootkit is a piece of malicious software which has the advanced capability of hiding itself on an infected system. This is usually done by hooking system functions. For example a rootkit could be ...
Listen to the Computerworld TechCast: Rootkits. If an illegal hacker wants to do something to your system, such as plant a virus, a Trojan horse program or spyware, he has to gain access to the system ...
The mysterious Avatar rootkit, detected by ESET as Win32/Rootkit.Avatar, appears to reflect a heavy investment in code development, with an API and a SDK available, plus an interesting abuse of Yahoo ...
If anything good has come from the Sony DRM rootkit debacle, it's an increased awareness of the peril of rootkits. How many people knew what a rootkit was? Or heard of a rootkit? Outside of security ...
At Black Hat Europe in mid-April 2009, Anthony Lineberry presented an interesting paper on how attackers with root privileges might use a /dev/mem rootkit, hiding their attacks by directly altering ...
A new Trojan horse is so good at hiding itself that some security researchers claim a new chapter has begun in their battle against malicious-code authors. The new pest, dubbed "Rustock" by Symantec ...
In order to protect your PC it is important to download the latest signatures from your Internet security software vendor daily and regularly scan your system to detect and eliminate stealthy viruses, ...
The good news is that neither rootkit has shown up in the wild. And Dai Zovi says such a hack is not imminent. The bad news: Dai Zovi says these hacks haven’t been unleashed on unsuspecting enterprise ...