LAS VEGAS—Just when anti-virus vendors think they have a bead on the threat from stealth rootkits, along comes word that a pair of researchers have discovered a new way to hide malicious programs.
Researchers at North Carolina State University and Microsoft Research have come up with a way to combat rootkits by using the machine's own hardware-based memory protection: the so-called HookSafe ...
Word that Intel is taking on rootkits came as a surprise to some last week. But researchers at the chip giant have been working on security technologies for several years. What's more, Intel's labs ...
Researcher at ESET outlines research on the first successful UEFI rootkit used in the wild. The discussion of Sednit was part of the 35C3 conference, and a session given by Frédéric Vachon, a malware ...
A digitally-signed rootkit is used in wide-reaching malicious activities aimed at stealing login credentials, payment information, and browsing history, spam social network users, and adware activity.
Apple announces deal to secure long-term flash memory supplies Apple today announced that it has reached long-term supply agreements with Hynix, Intel, Micron, Samsung Electronics and Toshiba to ...
Jamie Butler, a Windows internals expert who co-wrote the definitive book on rootkits, has created a free forensics tool capable of finding malicious code in live memory. The utility, called Mandiant ...
Malware exists in different flavors. Most of the time, malware consists of malicious files stored in computers operating systems, just like any other file, and running as software with or without high ...
Modern computers utilize what is known as a Unified Extensible Firmware Interface (UEFI) to get up and running. When you press the power button on your Mac or PC, the UEFI begins communicating with ...
Don’t think viruses, Trojans, and APTs are the only security problems that you need to worry about these days. Rootkits are still one of the most stealthy, potentially damaging and ultimately viable ...
These attacker tools have become stealthier than ever. Even so, they may not require specialized protection. Talk of , favorite attacker tools for compromising computer systems without detection, has ...