Sunday, October 22, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
DVDFab Debuts 4K Ultra HD Copy Software
Razer Unveils New Broadcasting Camera and Microphone
Microsoft's Cortana Gets Into Smart Speakers Market With Harman Kardon Invoke
Samsung, LG Electronics are Lagging in Autonomous Car Race
TSMC Raises Forecasts for 2017 Due to 10nm Demand, Outlines 7 and 5nm Roadmap
Samsung Said to Have Placed Huge EUV Equipment Order From ASML
Samsung Launches the Ruggedized Galaxy Tab Active2 for Business
Intel Capital Announces $60 million of New Investments in Data-Focused Startups
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Sony Us...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, August 28, 2007
Sony Uses Rootkits Again: F-Secure


A line of Sony USB drives installs files in a hidden folder that can be accessed and used by hackers, Finnish security company F-Secure charged on Monday, raising the specter of a replay of the Rootkit fiasco that hit Sony BMG two years ago.

According to F-Secure, the fingerprint-reader software included with the Sony MicroVault USM-F line of flash drives installs a driver that hides in a hidden directory under "c:indows". That directory, and the files within it, are not visible through Windows' API, F-Secure said.

"It is our belief that the MicroVault software hides this folder to somehow protect the fingerprint authentication from tampering and bypass. It is obvious that user fingerprints cannot be in a world writable file on the disk when we are talking about secure authentication," F-Secure said. "However, we feel that rootkit-like cloaking techniques are not the right way to go here. As with the Sony BMG case we, of course, contacted Sony before we decided to go public with the case. However, this time we received no reply from them," the company concludes.

The fact that the hidden directory goes unspotted by some antivirus scanners makes the situation similar to the Sony BMG rootkit case in late 2005. Then, researchers spotted rootkit-like cloaking technologies used by the copy-protection software Sony BMG Music Entertainment installed on PCs when customers played the label's audio CDs.


Previous
Next
Sony to Ship HD Video Walkman This September        All News        Sony Unveils New VAIO LT All-in-One PC
Early 2008 Release For Vista SP1     General Computing News      Yahoo Mail Lets Users Text-message to Phones

Get RSS feed Easy Print E-Mail this Message

Related News
John Kodera Promoted to President and CEO at Sony Interactive Entertainment
New Sony Cyber-shot RX100 IV Supports Phase-detect AF and 24 fps Bursts
Sony Unveils New Smartphones, Audio and Imaging Products at IFA 2017
New Sony Magnetic Tape Storage Technology Supports High-Capacity 330 TB Recording
Image Sensors and Music Lead Sony's Growth
Sony Entertainment to Start Vinyl Record Production
Sony Xperia XZ Premium Flagship And Xperia Touch Projector will Cost You a Fortune
Sony Chief Promises Return to Profitability
Sony Returns to the OLED TV Market With New Models
Image Sensors, Batteries And Playstation Boosts Sony's Profit
Sony Launches The a9 24MP 20fps Full-frame Sports Camera
Sony Commercializes High-Sensitivity CMOS Image Sensor for Automotive Cameras

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .