Hooks Hijacked? New Research Shows How To Block Stealthy Malware Attacks

The spread of malicious software, also known as malware or computer viruses, is a growing problem that can lead to crashed computer systems, stolen personal information, and billions of dollars in lost productivity every year. One of the most insidious types of malware is a “rootkit,” which can effectively hide the presence of other spyware or viruses from the user — allowing third parties to steal information from your computer without your knowledge. But now researchers from North Carolina State University have devised a new way to block rootkits and prevent them from taking over your computer.

To give some idea of the scale of the computer malware problem, a recent Internet security threat report showed a 1,000 percent increase in the number of new malware signatures extracted from the in-the-wild malware programs found from 2006 to 2008. Of these malware programs, “rootkits are one of the stealthiest,” Continue reading at ScienceDaily.

Related Posts

WhiteHat Aviator: A browser for privacy and security, but is proprietary and for OS X only... WhiteHat Aviator is a Web browser that's just been released by WhiteHat Security, a Web security company based in Santa Clara, California. At a time w...
World’s smallest 4 megapixel USB3 vision camera and Tux, the Linux mascot Ximea just announced the world's smallest 4 megapixel USB3 vision industrial high-speed camera. Measuring just 26.4 x 26.4 x 21.6-mm, it is the latest...
From EFF’s Secret Files: Anatomy of a Bogus Subpoena From the Electronic Frontier Foundation: Can the U.S. government secretly subpoena the IP address of every visitor to a political website? No, but tha...
Building Interactive Maps with Leaflet Leaflet is an JavaScript library for building interactive maps. RStudio released a package that allows us to build these maps in R! You can do som...
2014: Ringing it in by migrating from Apache to Nginx Happy new year everybody. 2013 was brutal, but I think 2014 will be much better. I've spent the past week moving this website from a provider based...
Docker 1.8 and the New Daemon Command Docker 1.8 was released just about a month ago. With it came some very much requested and needed features, like Docker Content Trust, Docker Toolbo...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*