Rootkit
- News
Rootkit Discovered in Over 2.8 Million Low-Cost Android Phones
Close to 3 million Android phones have been discovered to contain a very powerful rootkit/backdoor that leaves the user vulnerable to remote control, tracking and code execution attacks. These phones are affordable low-cost models and can be purchased in the US in any Best Buy store. Researchers from BitSight Technologies…
Read More » - News
Street Fighter V Root Kit Removal Tool Released
Capcom really dropped the ball with their Street Fights V update, which used a root kit to manage the games licence without requiring online access, although it did need Kernal access to your OS, which is never a good thing. They later backtracked the update, but have now released an…
Read More » - News
Intel CPUs Could Contain Huge Security Flaw
A management technology present in Intel x86 CPUs for the past decade might contain a massive vulnerability which, if exploited, could leave systems vulnerable to “nearly unkillable, undetectable rootkit attacks.” According to a report by BoingBoing, the Intel Management Engine (ME) – which allows administrators to remotely access and control…
Read More » - News
Intel Processors Vulnerable to Rootkit Exploit Since 1997
A researcher from the Battelle Memorial Institute has revealed that every Intel x86-based processor – and possibly some AMD processors – since 1997 are vulnerable to a rootkit exploit that could grant hackers access to the low-level firmware of a PC. Christopher Domas revealed the concern at the Black Hat…
Read More » - News
Hacking Team’s Rootkit Can Survive Hard Drive Scrubbing
Investigations by Trend Mirco have uncovered that the now-infamous spyware distributed by Italian surveillance outfit Hacking Team can survive the scrubbing or removal of a hard drive. Trend Mirco has revealed that the Remote Control System, Hacking Team’s backdoor malware, writes itself to the target computer’s BIOS. The virulent malware…
Read More » - News
New Rootkit Uses Your Graphics Card as Blind Spot
Viruses, Trojans and Malware all have one thing in common, they try to stay hidden and move around so they won’t be detected before the job is done and the user discovers the unwanted piece of software. As the anti-virus tools become better, researchers are looking for new areas where…
Read More »