Rootkits evade hardware detection
Security researcher Joanna Rutkowska has demonstrated several methods that sophisticated rootkits can use to hide from even the most reliable detection method currently available -- hardware-based products that read a system's RAM.
Rutkowska is a researcher with security firm Coseinc Advanced Malware Labs.
She recently outlined several ways of getting around the UAC (User Account Control) feature introduced in Windows Vista. Several researchers have identified problems with UAC.
[ Read more ]
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.