LAS VEGAS—Just when anti-virus vendors think they have a bead on the threat from stealth rootkits, along comes word that a pair of researchers have discovered a new way to hide malicious programs.
Researchers at North Carolina State University and Microsoft Research have come up with a way to combat rootkits by using the machine's own hardware-based memory protection: the so-called HookSafe ...
The detectors themselves typically work by comparing different views of the system and seeing where there's a mismatch. One of the original ways to perform this kind of detection was to dump a ...
Word that Intel is taking on rootkits came as a surprise to some last week. But researchers at the chip giant have been working on security technologies for several years. What's more, Intel's labs ...
Researcher at ESET outlines research on the first successful UEFI rootkit used in the wild. The discussion of Sednit was part of the 35C3 conference, and a session given by Frédéric Vachon, a malware ...
A digitally-signed rootkit is used in wide-reaching malicious activities aimed at stealing login credentials, payment information, and browsing history, spam social network users, and adware activity.
Malware exists in different flavors. Most of the time, malware consists of malicious files stored in computers operating systems, just like any other file, and running as software with or without high ...
Apple announces deal to secure long-term flash memory supplies Apple today announced that it has reached long-term supply agreements with Hynix, Intel, Micron, Samsung Electronics and Toshiba to ...
Don’t think viruses, Trojans, and APTs are the only security problems that you need to worry about these days. Rootkits are still one of the most stealthy, potentially damaging and ultimately viable ...
Researchers have uncovered what appears to be the first case of a UEFI rootkit in the wild, changing the concept of active UEFI exploit from a conference topic to reality. The UEFI rootkit was found ...
These attacker tools have become stealthier than ever. Even so, they may not require specialized protection. Talk of , favorite attacker tools for compromising computer systems without detection, has ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results