Friday, April 20, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
ZTE Says Company's Survival at Risk
2nd Generation AMD Ryzen Desktop Processors Arrive to Offer Great Value
Lenovo Unveils New moto g6 and moto e5 Smartphones
SpaceX Successfully Launches NASA's TESS Spacecraft
LG SmartThinQ Home Appliances Get Amazon Alexa Connectivity
Huawei Announces New Honor 10 Flagship Smartphone
Garmin Announces Connect IQ 3.0 with New apps from Trailforks, Yelp, iHeartRadio
Intel Open Sources the nGraph Compiler for Deep Learning Systems
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Sony Us...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, August 28, 2007
Sony Uses Rootkits Again: F-Secure


A line of Sony USB drives installs files in a hidden folder that can be accessed and used by hackers, Finnish security company F-Secure charged on Monday, raising the specter of a replay of the Rootkit fiasco that hit Sony BMG two years ago.

According to F-Secure, the fingerprint-reader software included with the Sony MicroVault USM-F line of flash drives installs a driver that hides in a hidden directory under "c:indows". That directory, and the files within it, are not visible through Windows' API, F-Secure said.

"It is our belief that the MicroVault software hides this folder to somehow protect the fingerprint authentication from tampering and bypass. It is obvious that user fingerprints cannot be in a world writable file on the disk when we are talking about secure authentication," F-Secure said. "However, we feel that rootkit-like cloaking techniques are not the right way to go here. As with the Sony BMG case we, of course, contacted Sony before we decided to go public with the case. However, this time we received no reply from them," the company concludes.

The fact that the hidden directory goes unspotted by some antivirus scanners makes the situation similar to the Sony BMG rootkit case in late 2005. Then, researchers spotted rootkit-like cloaking technologies used by the copy-protection software Sony BMG Music Entertainment installed on PCs when customers played the label's audio CDs.


Previous
Next
Sony to Ship HD Video Walkman This September        All News        Sony Unveils New VAIO LT All-in-One PC
Early 2008 Release For Vista SP1     General Computing News      Yahoo Mail Lets Users Text-message to Phones

Get RSS feed Easy Print E-Mail this Message

Related News
Sony's DPT-CP1 Paper E Ink Tablet Coming Early June
Sony's Xperia XZ2 Premium Brings Ultra-high Sensitivity Dual Camera, 4K HDR Movie Recording and Display
New Sony a7 III 24MP Full Frame Mirrorless Camera Retails For Less Than $2,000
Sony's New Xperia XZ2 Supports 4K HDR Video Recording
Sony to Build Taxi-hailing System
New Sony Back-Illuminated CMOS Image Sensor Enables Global Shutter Function
Sony Announces Pricing for X900F and X850F Series 4K HDR Ultra HD TVs
Music and TV Sales Fuel Sony's Record Third Quarter Profit, Hirai to Step Down
Sony to Showcase New Creative and Technological Concepts at SXSW 2018
CES: Sony Presents New OLED TVs, Audio Products, Robot Car Image Sensors
Sony Unveils new Selfie Xperia XA2 and Xperia XA2 Ultra Smartphones
Sony Revives the AIBO Robot Dog

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .