Linked by David Adams on Sun 9th May 2010 03:54 UTC
Bugs & Viruses According to The Register, "Researchers say they've devised a way to bypass protections built in to dozens of the most popular desktop anti-virus products, including those offered by McAfee, Trend Micro, AVG, and BitDefender. The method, developed by software security researchers at matousec.com, works by exploiting the driver hooks the anti-virus programs bury deep inside the Windows operating system. In essence, it works by sending them a sample of benign code that passes their security checks and then, before it's executed, swaps it out with a malicious payload."
Thread beginning with comment 423450
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[2]: Not that simple
by roverrobot on Sun 9th May 2010 23:55 UTC in reply to "RE: Not that simple"
roverrobot
Member since:
2006-07-23

First of all the first rootkits were actually developed for Unix, not Windows.


Hmm, the first rootkit was believed to be written in 1990 or even earlier. At that time, how could one write a windows rootkit? Or, more precisely, every program written for windows at that time had full privilege, so, who would need a rootkit for windows then?

Reply Parent Score: 1

RE[3]: Not that simple
by moondevil on Mon 10th May 2010 05:20 in reply to "RE[2]: Not that simple"
moondevil Member since:
2005-07-08

Exactly, by that I wanted to say that even Unix is not that safe if you know where are the week points.

Reply Parent Score: 2

RE[4]: Not that simple
by roverrobot on Mon 10th May 2010 21:27 in reply to "RE[3]: Not that simple"
roverrobot Member since:
2006-07-23

Exactly, by that I wanted to say that even Unix is not that safe if you know where are the week points.


True. No OS is bullet proof. But that does not mean that windows is as safe as other OS.

Reply Parent Score: 1