I've been given a 2 Ghz Acer laptop (4 GB RAM) running Vista. The previous owner believes the Acer is infected with a keylogger put there by her ex-husband.<BR><BR>I want to use the Acer as a gaming ...
Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer’s microprocessor, hidden from current antivirus products. Called a ...
These attacker tools have become stealthier than ever. Even so, they may not require specialized protection. Talk of , favorite attacker tools for compromising computer systems without detection, has ...
One of the newest threats in the wild&#8212;what security mavens mean by "loose on the net"&#8212;is called a "rootkit," or RK for short. While a rootkit by itself causes no damage, it attempts to ...
The good news is that neither rootkit has shown up in the wild. And Dai Zovi says such a hack is not imminent. The bad news: Dai Zovi says these hacks haven’t been unleashed on unsuspecting enterprise ...
Rootkits hide processes, files, and network connections and can be written to perform like a device driver on any operating system. Most people associate rootkits with the questionable practices of ...
Sophos PLC has released a free tool to help PC users root out rootkits. Called Sophos Anti-Rootkit, the software will detect and remove both known and unknown rootkits, and it will also warn system ...
Antivirus firms Trend Micro and Sophos have developed new tools to discover rootkit infections but both are attacking the problem from a slightly different angle. Rootkits are powerful programs that ...