Search This Blog

Thursday, January 10, 2008

New rootkit uses old trick to hide itself; First Trojan reported for the iPhone

Security Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
New rootkit uses old trick to hide itself

Robert McMillan By Robert McMillan
Over the past month, a new type of malicious software has emerged, using a decades-old technique to hide itself from antivirus software. Read full story

MORE STORIESARROW


SPONSORED BY MESSAGELABS
rule

Executive Guide: A look at data protection
Read this Executive Guide, "Keeping Data Safe and Found," to learn the latest news, analysis, and real-world user advice on protecting corporate data. This comprehensive Executive Guide examines technologies and methodologies, the cost of regulatory compliance and how IT professionals are juggling these issues today. Learn more today. Download this Executive Guide now.

rule
RELATED NEWS:

First Trojan reported for the iPhone, 01/08/08 While not a huge risk, the first Trojan for the iPhone has been discovered. The first reports came from iPhone enthusiast site Modmyifone.com and were later confirmed by security research company F-Secure.

Facebook 'Secret Widget' not our fault, Zango CEO says, 01/09/08 The Facebook 'Secret Crush' widget which has tricked millions of Facebook users into downloading spyware was not our idea, Zango CEO Keith Smith says.

Storm worm, other botnets, kept spam levels high in 2007, 01/09/2008 Botnets helped keep spam output at consistently high levels last year, and global spam reached rates as high as 96% of all e-mail traffic during ...

New, super nasty rootkit infects XP machines Symantec has found a new rootkit that hides from Windows XP on the hard drive's boot sector.

Spammers hijack Microsoft site to push pill popping, 01/09/08 Spammers have found another great place to hide spam URLs in plain sight - on Microsoft's Live SkyDrive file sharing service.

Open source security bugs uncovered, 01/09/08 A U.S. Department of Homeland Security (DHS) bug-fixing scheme has uncovered an average of one security glitch per 1,000 lines of code in 180 widely used open source software projects.

Verizon Business launches managed Unified Threat Management service, 01/09/08 Verizon Business expanded its managed services portfolio today by announcing that it will be offering a Unified Threat ...

Firms are still testing with live customer data, study warns, 01/09/08 A majority of organizations are creating unnecessary risks by using actual customer data for the development and testing of applications, according to a survey by Compuware and the Ponemon Institute.

Yahoo tests support for OpenID, 01/09/08 Yahoo appears close to implementing OpenID, a Web authentication standard that relieves people of the need to remember multiple passwords to log into different Web sites.

Free Trojan removal tool for OS X available now, 01/09/08 SecureMac has introduced a free Trojan Detection Tool for Mac OS X.


IT DEPARTMENT DEAD?
Nicholas Carr Nicholas Carr says utility computing will replace internal IT shops.

WHAT'S HOT AT CES?
CES International 2008 Take a look at the coolest technology straight from the showroom floor.

SPONSORED BY MESSAGELABS
rule

Executive Guide: A look at data protection
Read this Executive Guide, "Keeping Data Safe and Found," to learn the latest news, analysis, and real-world user advice on protecting corporate data. This comprehensive Executive Guide examines technologies and methodologies, the cost of regulatory compliance and how IT professionals are juggling these issues today. Learn more today. Download this Executive Guide now.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/10/08

TODAY'S MOST-READ STORIES:

  1. The IT department is dead, author argues
  2. Is gaming Google a gateway to crime?
  3. Top stories from the International CES
  4. Student antics with cell phones, iPods
  5. Sprint gets WiMAX soft launch underway
  6. The 15 best downloads of the year
  7. Nugache worm kicking up a Storm
  8. Mergers, acquisitions on the mgmt. front
  9. Cisco's virtual switch smashes records
  10. Can femtocells live up to the hype?

FEATURED BUYER'S GUIDE:
Client Management


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: