by Katherine Parker | Jul 31, 2019 | Malware, Malware Incident Response, Rootkit, Uncategorized
Rootkits may use any of a number of techniques to gain control of a system. We touched on this in “Man Behind the Curtain” introduction to Rootkit Malware, that rootkits come in different makes and models, and the type of rootkit will determine the choice of attack...
by Katherine Parker | Jul 25, 2019 | Device Security, Malware, Mobile Devices, Rootkit, Uncategorized
Definition of a Rootkit A rootkit is a set of software tools designed to reside in the top-level directory (the “root”) of a file system. Rootkits can be used to detect attacks and provide anti-theft defenses. But because they can also enable unauthorized...
Recent Comments