Wednesday, April 23, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Facebook Enjoys High First-quarter Revenue
Qualcomm Reports Less Than Expected 2Q Revenue
iPhone Sales Drive Apple's Record March Quarter Revenue
Travelling Through Time On Updated Google Maps
OnePlus One To Launch Next Month
LG Display Reports First Quarter Results
Toshiba Announces Canvio AeroMobile Wireless SSD
Global Chip Revenue Rises in 2013
Active Discussions
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
Video editing software.
 Home > News > General Computing > Rootkit...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, April 18, 2006
Rootkit Growth, Reports McAfee


Security report released on Monday by McAfee rootkits and notes an increase in the number and complexity of rootkit over the last three years.

In the first quarter, the number of rootkits observed by McAfee's Avert Labs grew by 700 percent, compared with the same period last year, the company said. Its research into "stealth techniques" also covered cloaking technology bundled with commercial programs, such as Sony BMG's antipiracy tool, and with potentially unwanted software such as adware.

In the first quarter alone, the Avert Labs found more than 827 stealth techniques. That contrasts with about 70 found in the same period in 2005 and with approximately 769 for the whole year.

"This trend in malware evolution is creating hardier and ever more virulent strains of malware that will continue to threaten businesses and consumers alike," Stuart McClure, McAfee Senior Vice President of Global Threats, said in a statement.

An "open-source environment" for development of stealth code among hackers is driving this rapid growth, McAfee said. Collaborative web sites and blogs contain hundreds of lines of rootkit code for recompiling and enhancing the technology, along with rootkit binary executables, McAfee said.

As a result, attackers have an easier time creating ways to hide their malicious files, processes and registry keys without extensive knowledge of the targeted operating system.

During the first quarter, 612 stealth components were submitted to Avert Labs, compared with 60 in the same period last year, the report noted. The first-quarter figure was also nearly equal to that for all of 2005.

Microsoft's Windows is the main target of malicious rootkits because of its high level of use, but many undocumented application programming interfaces (APIs) are also targets, according to McAfee.

In forecasting the growth of rootkits, McAfee noted that a widespread adoption of Microsoft's Vista may decrease Windows-related attacks, but that won't be in the near future.

"We can predict that, in the coming two or three years, the growth of rootkits for the current Windows architecture will reach an annual rate of at least 650 percent," the report stated.

To read the entire PDF report from McAfee click here.


Previous
Next
Acer Leaves BenQ's Board of Directors        All News        Plextor Introduces Portable Hard Drives
Acer Leaves BenQ's Board of Directors     General Computing News      Cirrus Logic Boosts Audio DSP with Greater Performance

Get RSS feed Easy Print E-Mail this Message

Related News
Nokia Devices and Services Acquisition Expected to Close This Week
Microsoft and Motorola Solutions Sign Licensing Agreement
China Approves Sale of Nokia's Business to Microsoft
Microsoft Announces New Cloud Tools
Microsoft Previews .NET Native Platform For App Developers
Microsoft Says It Won't Search Users' Emails For Stolen Property
Microsoft and Dell Sign Patent Licensing Deal
Microsoft Opens Source Code for MS-DOS and Word For Windows to Public
Nokia, Microsoft Deal Delayed
Microsoft Searched Hotmail Messages To Track Leak
SQL Server 2014 Coming April 1st
Microsoft Releases 2013 Law Enforcement Requests Report

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .