Tuesday, February 20, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
KT, Qualcomm and Samsung Achieve Multi-vendor 5G NR Interoperability on Path to Mobile 5G NR Trials
Sony to Build Taxi-hailing System
Samsung to Cut OLED Panel Production as iPhone X Demand Slows: report
Samsung Electronics Begins Mass Production of 30.72TB SSD
Microsoft Reveals Windows 10 on ARM Limitations
Fujitsu to Showcase Quantum-Inspired, Digital Annealer Computational Architecture at Mobile World Congress 2018
Investors and Consumers Sued Intel Over Meltdown and Spectre CPU Security Flaws
Belgian Court Fines Facebook Over Users Tracking
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Sony Us...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, August 28, 2007
Sony Uses Rootkits Again: F-Secure


A line of Sony USB drives installs files in a hidden folder that can be accessed and used by hackers, Finnish security company F-Secure charged on Monday, raising the specter of a replay of the Rootkit fiasco that hit Sony BMG two years ago.

According to F-Secure, the fingerprint-reader software included with the Sony MicroVault USM-F line of flash drives installs a driver that hides in a hidden directory under "c:indows". That directory, and the files within it, are not visible through Windows' API, F-Secure said.

"It is our belief that the MicroVault software hides this folder to somehow protect the fingerprint authentication from tampering and bypass. It is obvious that user fingerprints cannot be in a world writable file on the disk when we are talking about secure authentication," F-Secure said. "However, we feel that rootkit-like cloaking techniques are not the right way to go here. As with the Sony BMG case we, of course, contacted Sony before we decided to go public with the case. However, this time we received no reply from them," the company concludes.

The fact that the hidden directory goes unspotted by some antivirus scanners makes the situation similar to the Sony BMG rootkit case in late 2005. Then, researchers spotted rootkit-like cloaking technologies used by the copy-protection software Sony BMG Music Entertainment installed on PCs when customers played the label's audio CDs.


Previous
Next
Sony to Ship HD Video Walkman This September        All News        Sony Unveils New VAIO LT All-in-One PC
Early 2008 Release For Vista SP1     General Computing News      Yahoo Mail Lets Users Text-message to Phones

Get RSS feed Easy Print E-Mail this Message

Related News
Sony to Build Taxi-hailing System
New Sony Back-Illuminated CMOS Image Sensor Enables Global Shutter Function
Sony Announces Pricing for X900F and X850F Series 4K HDR Ultra HD TVs
Music and TV Sales Fuel Sony's Record Third Quarter Profit, Hirai to Step Down
Sony to Showcase New Creative and Technological Concepts at SXSW 2018
CES: Sony Presents New OLED TVs, Audio Products, Robot Car Image Sensors
Sony Unveils new Selfie Xperia XA2 and Xperia XA2 Ultra Smartphones
Sony Revives the AIBO Robot Dog
Sony Raises Earnings Outlook, as Camera Chips, TVs Fuel Recovery
Sony develops Remote-driven Electric Vehicle
Sony's New Full-frame α7R III Interchangeable Lens Camera Combines 42.4 MP Resolution and Speed
John Kodera Promoted to President and CEO at Sony Interactive Entertainment

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .