rootkits
Malicious MIDI files lead to rootkit malware
A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets’ …
Malicious QR codes and the persistence of rootkits
Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …
Duqu: Another “most advanced” piece of malware
Rootkit.Duqu.A is the current star in the world of malware but, as history shows, that fame will be short-lived. Just like fashion models, modern malware has a lifespan in the …
Bing, Yahoo! serving malware for popular search terms
Bing results for popular search terms such as “Firefox/Skype/AdobePlayer/uTorrent download” have been poisoned with bogus websites pushing a variety of malware. On …
BIOS rootkit found in the wild
Security researchers have recently discovered a new rootkit that targets computers’ BIOS, making the infection harder to detect and eradicate, and persist even if the …
McAfee introduces anti-rootkit security beyond the OS
Cybercriminals know how to evade current operating systems-based security, demanding a new paradigm – security beyond the operating system. On that note, McAfee …
Malware targeting Android jumps 76 percent
The amount of malware targeted at Android devices jumped 76 percent since last quarter, to become the most attacked mobile operating system, according to McAfee. 2011 has also …
Solution for Popureb rootkit infection
Bootkits are kernel-mode rootkit variants that hide in the computer’s master boot record (MBR) and are notoriously difficult to spot and, sometimes, to eradicate. …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments