Rootkits are infected with every 6 PCs
Prevx security analysts have warned computer users, especially enterprise systems, that are threatened by development.
Security analysts from Prevx warned computer users, especially enterprise systems, were threatened by the " extreme " development of rootkit software.
More than 725,000 computers were scanned with the malware detection tool Prevx CSI Malware for a period of two months that identified many different forms of malware and spyware, according to the ratio of 1 in 6 PCs. infection. Especially computers in the system of businesses with the highest rate of rootkit infection.
According to Prevx statistics, the number of rootkit infection computers has increased from 15.6% in October to 22% in early December. "The rootkit shadow is beginning to cover the computer era," Jacques Erasmus expert of Prevx is witty. "Be wary and have an appropriate security solution to prevent rootkits from being effective."
Rootkits are very " tricky " programs. After infiltrating into the computer, they adjust themselves to hide themselves before the user and other security programs already installed on the system. Hidden on the system, the rootkit silently records, modifies, steals data from the victim's computer. Not every anti-virus program can detect rootkits on the system, so sometimes users still believe that their computers are " clean " and lack of vigilance with valuable financial information and personal data. treatment.
Malware can be distributed through search engine cache
Rootkit, high "thief" hands should be alert to stop.
According to security firm Aladdin, the cache of the top search engines, Google, Yahoo and MSN Live, still provides a hidden place for . malicious code. The company regularly records an attack on the university website that traces its "poisoned" cache. This website has been deactivated but the malicious code from it is still distributed through the search engine's cache.
Security firm Aladdin not only specifically search engines have distributed malicious code from the website, but said all the top three search engines today are Google, Yahoo and MSN Live have been the case. Pages cached can "live" from weeks to months until the cache is refreshed.
Most malicious websites have a copy version on the search engine's caching server. However, search engine managers have not taken any action to handle this issue. Above all, Internet users must always be alert to strange websites and never turn off the anti-virus or firewall programs on the computer when browsing the web.
Tuyet Phan
- Rootkits - potential dangers
- Sony accepts to compensate customers for buying CDs containing rootkits
- Early detection and treatment of TB for HIV-infected people
- Insects can find infected plants
- Prevention of intestinal helminthes infection
- Identify infected cucumbers
- Malware will not be detected
- The first horse infected with the deadly virus Lyssa
- The scientist announced that he had destroyed the HIV-infected cells
- There was a second American infected with Ebola
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system