by Katherine Parker | Jul 31, 2019 | Malware, Malware Incident Response, Rootkit, Uncategorized
Rootkits may use any of a number of techniques to gain control of a system. We touched on this in “Man Behind the Curtain” introduction to Rootkit Malware, that rootkits come in different makes and models, and the type of rootkit will determine the choice of attack...
by Katherine Parker | Jul 25, 2019 | Device Security, Malware, Mobile Devices, Rootkit, Uncategorized
Definition of a Rootkit A rootkit is a set of software tools designed to reside in the top-level directory (the “root”) of a file system. Rootkits can be used to detect attacks and provide anti-theft defenses. But because they can also enable unauthorized...
by Katherine Parker | Jul 9, 2019 | Data Security, Malware, Network Security, Uncategorized
When we discuss the problems of malware on industry, our conversations around the water cooler often focus on the symptoms. We discuss the immediate problems experienced by malware: slowing down computers, locking operators out of programs. But there is a cause-effect...
by Katherine Parker | Jul 1, 2019 | General Information, Malware, Network Security
IT News Brief July 2019: Understanding the difference between a virus and a worm, and how each category of malware operates, will help give understanding about why different software and appliances address and prevent the various infections. Plus, get to know our...
Recent Comments