News & Announcements

Hooks Hijacked? New Research Shows How To Block Stealthy Malware Attacks

The spread of malicious software, also known as malware or computer viruses, is a growing problem that can lead to crashed computer systems, stolen personal information, and billions of dollars in lost productivity every year. One of the most insidious types of malware is a “rootkit,” which can effectively hide the presence of other spyware or viruses from the user — allowing third parties to steal information from your computer without your knowledge. But now researchers from North Carolina State University have devised a new way to block rootkits and prevent them from taking over your computer.

To give some idea of the scale of the computer malware problem, a recent Internet security threat report showed a 1,000 percent increase in the number of new malware signatures extracted from the in-the-wild malware programs found from 2006 to 2008. Of these malware programs, “rootkits are one of the stealthiest,” Continue reading at ScienceDaily.

Related Posts

Secret NSA technology that can hack computers not connected to the Internet For the really paranoid, for the more security-conscious out there, and for those keeping track of the capabilities of the NSA to spy and track, this ...
Toshi, an MIT-licensed bitcoin node for developers released Coinbase has announced the released of Toshi, a bitcoin node for developers. Toshi is strictly a developers-only solution that's written in Ruby, ...
APC Paper nabs Computex ‘s Design and Innovation Award Taiwan External Trade Council (TAITRA) and the International Forum Design Hannover (iF) have awarded the APC Paper the Design and Innovation Award at ...
Bjoern A. Zeeb receives second Itojun Service Award at IETF 79 Meeting source - Internet Society Monthly Newsletter: The second Itojun Service Award was presented today at this week’s Internet Engineering Task Force (IET...
Moving to open source would save government one to four billion The Dutch could save one to four billion Euro per year, if their public administrations would move to open source software, according to calculations ...
Clustering Atomic Hosts with Kubernetes, Ansible, and Vagrant A single Atomic Host is a fine place to run your containers, but these hosts are much more fun when bunched into clusters, a task that we can manage w...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*