<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d24605170\x26blogName\x3dWhat\x27s+New\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://newsko.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://newsko.blogspot.com/\x26vt\x3d-5077661798594369790', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
   What's New[definition].  
 
    
Google
Google Web
« Home

Posts

Check Maxtor's Pocket Sized Drive
Steve Wozniak Doesn't Like Apple's Boot Camp
Web services: Microsoft's Path
Toshiba HD-A1 HD DVD player goes topless
Panasonic's DVDS52 $100 up-scaler
Novatel X620 EV-DO ExpressCard gets real
Marantz's new VP-1C1s1 1080p DLP projector
Air Oxyride: 100 batteries included
Samsung YP-U2X on sale in the US
OnMac triple boots Mac from Boot Camp
 
     Archives
March 2006
April 2006
May 2006
June 2006
July 2006
 
     Links




Word of the Day

Article of the Day

This Day in History

In the News

Quotation of the Day

Rootkits use continues to grow

Malware is increasingly using rootkit technology to hide its operations from security software, according to security researchers at McAfee's AVERT Labs.

The number of incidents where malware and adware-like applications use stealth technology increased by more than 600 per cent over the past three years, the researchers found. In the first quarter of this year, the number of incidents increased almost 700 per cent year-over-year.

“Clearly we are seeing that stealth technologies, and rootkits specifically, are increasing at an alarming rate,” said Stuart McClure, senior vice president for global threats with McAfee. “This trend in malware evolution is creating hardier and ever more virulent strains of malware that will continue to threaten businesses and consumers alike.”

McAfee blamed the rise of rootkit technology to the wide availability of information on how to create such technology, up to the existence of commercial kits that take the effort out of malware creation.

Rootkit technology is traditionally used to build a back door into a system, allowing a hacker easy access to a system. The technology lately has had a second career as a way to cloak files and processes from the user and security software to prevent detection and removal.

The most famous example of rootkit technology is the XCP anti-piracy application that the Sony BMG record label introduced last year. The technology was intended to prevent illegal copying of music CDs, but also posed a significant security risk to computers on which it was installed.

Rootkits use continues to grow - Monday, April 17, 2006 -

Post a Comment

Enter your email address:

Delivered by FeedBurner



 


Linux Tips and Tricks - Mox Diamond - Arcane Denial - Sylvan Library
Linux Tips and Stuff - ba-zoo-ra - iBUG teks/

© 2006 What's New