Tags » Rootkit

Blog Post Shout Out September 2015

In recent days there has been detailed coverage of a new technique used to tamper with legitimate Apple iOS apps by adding extra code to those apps when they were being compiled (converted from human written source code into a form that a computer can use). 371 more words

Security Advice

Honeynet Scan of the month, Scan 15

I was given a task to complete HoneyNet Scan of the month -challenge, Scan #15. The challenge is stated below and some keywords for the scan would be… 1,111 more words


Lenovo used shady 'rootkit' tactic to quietly reinstall unwanted software

Lenovo has been caught using a technique, often used by some malware to withstand being deleted, to reinstall unwanted software on the computers it sells. 338 more words

Ciber Seguridad General

Decades Old Rootkit Exploit Discovered in Intel Processors!

A Researcher makes a sensational claim after discovering Intel and AMD processors to be vulnerable due to a fundamental design flaw dating back to 1997. 419 more words


Antivirus [some basic's] Part 1

So when you hear the word virus…most people will cringe at the though of having a physical virus, and the same should go for having a computer virus.  790 more words

Technical Support

Design flaw in Intel processors opens new doors for root kits…

How to: Get rid off Microsoft's OneDrive with one file.

With this shellcode you can get rid of Microsoft’s OneDrive plague. Which allows Windows (10) automatically store you private stuff and can be access by Microsoft staff for “juridical” reasons  according to the… 201 more words