The low-down on low-level rootkits
- 08 January, 2010 09:41
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools.
As noted in Microsoft's post, "getting hit by a live rootkit infection is among the more unfortunate fates that can befall an unsuspecting computer user." The company says it found low-level rootkits in about 7 percent of the infected computers it encountered. Low-level rootkits are those that attempt to modify the core of an operating system to hide its components, along with other installed malware.
The post covers the most commonly found rootkit families, and lists some of the places where rootkits commonly install files. As notes, those files will likely be hidden from normal view on an infected system, and require using a specialized rootkit scanner such as AVG Anti-Rootkit. Many antivirus programs also include rootkit scanners.
Rootkits can be highly difficult to remove once installed, as stated in Microsoft's blog. Your best bet by far is to practice good basic security and catch them before they can dig in.
- Research firm Radicati names Google Apps for Business the leader in cloud business email
- Provide clients with more powerful, cost-effective cloud hosted services
- Vintek partners with IBM to reduce costs and improve system reliability
- Switching to Google Apps brings many cost savings and productivity benefits, says commissioned study by Forrester Consulting
- View from the Cloud: An outlook on Australian businesses in 2013
Gold Coast-based Icon expands into US
Optus hits 2.3Gbps throughput in real-world test
Australia lags in e-signature adoption: Adobe
Users refuse to chuck XP as Windows 8 uptake flattens
Android takes 62 per cent share of tablet market in 2013