Hooks Hijacked? New Research Shows How To Block Stealthy Malware Attacks

The spread of malicious software, also known as malware or computer viruses, is a growing problem that can lead to crashed computer systems, stolen personal information, and billions of dollars in lost productivity every year. One of the most insidious types of malware is a “rootkit,” which can effectively hide the presence of other spyware or viruses from the user — allowing third parties to steal information from your computer without your knowledge. But now researchers from North Carolina State University have devised a new way to block rootkits and prevent them from taking over your computer.

To give some idea of the scale of the computer malware problem, a recent Internet security threat report showed a 1,000 percent increase in the number of new malware signatures extracted from the in-the-wild malware programs found from 2006 to 2008. Of these malware programs, “rootkits are one of the stealthiest,” Continue reading at ScienceDaily.

Related Posts

SkyJack software can hijack any drone, Prime Air drones included SkyJack software and a companion drone can be used to hijack and take command of nearby drones. I think a certain country in the Middle East has done ...
Controlling screen cursors with thoughts Using a new brain-computer training approach, 14 volunteers learned in only six minutes how to move a screen cursor with their thoughts. Near-instant ...
Quantum Computers Easier to Build: Can Tolerate Faulty or Missing Components, Researchers ... Quantum computers should be much easier to build than previously thought, because they can still work with a large number of faulty or even missing co...
How to install TwitteR, a Twitter client for R Installing packages in R is pretty easy, if you know the name of the package you wish to install. Just pass the name of the package to the install.pac...
How to install S3QL from source on Fedora 19 S3QL is an online file system for UNIX-like operating systems that provide features like compression, encryption, data de-duplication, immutable trees...
Shopping Online, Privacy, Data Protection and Third-Party Tracking In the wake of yet another e-commerce data breach in which the names and email addresses of millions of online shoppers and credit card users have bee...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*