Tags » Rootkit

ipfilterX Codename Logical

>Date 02/06/2017

>UPDATES:

-Blocked Threats:
-Updated Threats: [2]
-IP Added Record:
-Deleted:[-]
-Merged/Extended:[1]

>COUNTRIES INVOLVED:

>Parsed lines/entries:23K Found IP ranges:23K Duplicate:0 Merged:0 Time:0 secs

>IP Count: 550M… 87 more words

Making a Rootkit

#include <asm/unistd.h>

#include <asm/cacheflush.h>

#include <linux/init.h>

#include <linux/module.h>

#include <linux/kernel.h>

#include <linux/syscalls.h>

#include <asm/pgtable_types.h>

#include <linux/highmem.h>

#include <linux/fs.h>

#include <linux/sched.h>

#include <linux/moduleparam.h>

#include <linux/unistd.h>

#include <asm/cacheflush.h> 297 more words

Rootkit

Pop-culture can teach us a lot about computer security if we’re willing to dig a bit beneath the surface.

1. R2-D2 hides important data in plain sight… 699 more words

Security

Rootkit - Levitate (feat. Tylor Maurer)

Digital Crate Digging Continues per Music Monday!!  clear the runway, we’re coming through!

Digital? analog? let the music play!! we’re not done, no way!! we’re letting the peeps know what it do!! 102 more words

Breakbeat Science

System architecture and the role of antivirus software in different platforms

Antivirus software is essential to safeguarding the computing needs of every person from the perspective of keeping browsing activities on the Internet safe from privy eyes, to the prevention of hacking of personal files such as photos, documents and drawings. 1,978 more words

Computer Security

Reading the Unreadable SROM: Inside the PSoC4

Wow. just broke into the SROM on Cypress’ PSoC 4 chips. The supervisory read-only memory (SROM) in question is a region of proprietary code that runs when the chip starts up, and in privileged mode. 332 more words

Slider

Researchers Create Undetectable Rootkit That Targets Industrial Equipment

@tachyeonz : Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world. 6 more words

Iiot