Tags » Rootkit


1. KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object 읽기
이 논문에서는 커널 영역 중에서 mutable한 영역을 보호하는 HW based kernel integrity monitor KI-Mon을 제안한다. 57 more words

1) Memo

The big bad internet

Have you ever wondered, when you hear about Cyber thieves, hackers, DDOS and other things, what does that really mean?   Well today I will share with you some resources you can take a look at that will help give you a bigger picture to internet security and the need for it. 158 more words


Lottery chief who "rigged the randomness" is jailed for 10 years

Eddie Raymond Tipton, come on down!

Or, more precisely, “We’re sending you down for 10 years.”

Tipton faced court in April 2015, and was finally convicted… 555 more words


Blog Post Shout Out September 2015

Update: 24th November 2015:
Since this blog post was written FireEye have continued to monitor the command and control servers (defined) of XcodeGhost to determine where devices are located that are connecting to these servers and to determine if this malware still poses a threat. 791 more words

Security Advice

Honeynet Scan of the month, Scan 15

I was given a task to complete HoneyNet Scan of the month -challenge, Scan #15. The challenge is stated below and some keywords for the scan would be… 1,130 more words


Lenovo used shady 'rootkit' tactic to quietly reinstall unwanted software

Lenovo has been caught using a technique, often used by some malware to withstand being deleted, to reinstall unwanted software on the computers it sells. 338 more words

Ciber Seguridad General

Decades Old Rootkit Exploit Discovered in Intel Processors!

A Researcher makes a sensational claim after discovering Intel and AMD processors to be vulnerable due to a fundamental design flaw dating back to 1997. 419 more words