Linked by David Adams on Sun 9th May 2010 03:54 UTC
Bugs & Viruses According to The Register, "Researchers say they've devised a way to bypass protections built in to dozens of the most popular desktop anti-virus products, including those offered by McAfee, Trend Micro, AVG, and BitDefender. The method, developed by software security researchers at matousec.com, works by exploiting the driver hooks the anti-virus programs bury deep inside the Windows operating system. In essence, it works by sending them a sample of benign code that passes their security checks and then, before it's executed, swaps it out with a malicious payload."
Permalink for comment 423450
To read all comments associated with this story, please click here.
RE[2]: Not that simple
by roverrobot on Sun 9th May 2010 23:55 UTC in reply to "RE: Not that simple"
roverrobot
Member since:
2006-07-23

First of all the first rootkits were actually developed for Unix, not Windows.


Hmm, the first rootkit was believed to be written in 1990 or even earlier. At that time, how could one write a windows rootkit? Or, more precisely, every program written for windows at that time had full privilege, so, who would need a rootkit for windows then?

Reply Parent Score: 1