Saturday, October 25, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Panasonic to Offload Sanyo's North America TV Business
Google's Pichai to Become Head of Product at Google: report
Internet Explorer 11 Toolkit Allows Enterprise Admins "Spy" On Their Employees
FCC Says Airwave Auction To Delay Until 2016
HP Broadens Moonshot Portfolio With Intel-powered Models
Microsoft To Keep Nokia Brand For Low-end Smartphones
LG Introduces Its First Octa-Core Application Processor
Cloud and Surface 3 Drive Microsoft's Revenue
Active Discussions
Copied dvd's say blank in computer only
How to generate lots of different CDs quickly
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
 Home > News > General Computing > Sony Us...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, August 28, 2007
Sony Uses Rootkits Again: F-Secure


A line of Sony USB drives installs files in a hidden folder that can be accessed and used by hackers, Finnish security company F-Secure charged on Monday, raising the specter of a replay of the Rootkit fiasco that hit Sony BMG two years ago.

According to F-Secure, the fingerprint-reader software included with the Sony MicroVault USM-F line of flash drives installs a driver that hides in a hidden directory under "c:indows". That directory, and the files within it, are not visible through Windows' API, F-Secure said.

"It is our belief that the MicroVault software hides this folder to somehow protect the fingerprint authentication from tampering and bypass. It is obvious that user fingerprints cannot be in a world writable file on the disk when we are talking about secure authentication," F-Secure said. "However, we feel that rootkit-like cloaking techniques are not the right way to go here. As with the Sony BMG case we, of course, contacted Sony before we decided to go public with the case. However, this time we received no reply from them," the company concludes.

The fact that the hidden directory goes unspotted by some antivirus scanners makes the situation similar to the Sony BMG rootkit case in late 2005. Then, researchers spotted rootkit-like cloaking technologies used by the copy-protection software Sony BMG Music Entertainment installed on PCs when customers played the label's audio CDs.


Previous
Next
Sony to Ship HD Video Walkman This September        All News        Sony Unveils New VAIO LT All-in-One PC
Early 2008 Release For Vista SP1     General Computing News      Yahoo Mail Lets Users Text-message to Phones

Get RSS feed Easy Print E-Mail this Message

Related News
Sony To Release Android Lollipop To Its Entire Xperia Xperia Z Series
New Sony Headphones, Portable Headphone DAC/Amplifier and Headphone Cables Support Hi-Resolution Audio
Sony Xperia Z3 Coming To The US
PlayStation TV Coming October 14th
Sony Develops SmartEyeglass, Launches SDK
Sony To Offer Unity For PlayStation To PlayStation Licensed Developers
Sony Slashes Guidance Due To Poor Smartphone Sales
Sony Smart EyeGlass Prototype Appears At IFA
New Sony Camera Shoots In The Dark
Sony Unveils New Xperia Z3, Z3 Compact And More at IFA
Sony PSN Back Online
Sony Offers New Smart Tennis Sensor

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .