Bootkit – rootkit – malware bypasses disk encryption!
If you have not been nervous before about someone infecting computers without your knowledge then you should be much more nervous after reading this article. In 1987 the Stoned boot sector virus came...
View ArticleBlackHat USA technical presentations available online – not just for hackers
The media archives have now been posted on the BlackHat website from the BlackHat technical conference held in July 2009. This is the place to go if you want to see some of the latest information...
View ArticleMalware writers get a little HLP from you
I was roving around today on the McAfee TrustedSource Research Blog website and came across a very interesting entry about malware writers using Help files to mask infection sources. This is not a new...
View ArticleAnatomy of a crimeware rootkit – scary stuff!
I came across a recent tutorial on reverse engineering the ZeroAccess / Max++ / Smiscer Crimeware Rootkit. This is a very malicious rootkit that has features such as: Modern persistence hooks into the...
View Article
More Pages to Explore .....