Summary of kim zetter's countdown to zero day
Par : Everest Media
Editeur : Everest Media Llc
Numéro de produit : 9781669385288
ISBN : 9781669385288
2,99 $
Les livres numériques seront disponibles pour télécharger dès votre paiement effectué.
* Prix en dollar canadien. Taxes et livraison en sus.
Retour à la liste des produits
Please note: This is a companion version & not the original book.
Sample Book Insights:
#1 In 2010, Sergey Ulasen, head of the antivirus division of a small computer security firm in Belarus, found a computer virus that used a rootkit to cloak itself and make it invisible to antivirus engines. It used a shrewd zero-day exploit to spread from machine to machine.
#2 The mystery files came to the attention of VirusBlokAda when a reseller in Iran reported a persistent problem with a customer's machine. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.
#3 The two hackers found a rootkit on the system in Iran that was designed to hide four malicious. LNK files. The malware appeared to be using an exploit to spread itself via infected USB flash drives. The rootkit prevented the. LNK files from being seen on the flash drive.
#4 The LNK exploit attacked a fundamental feature of Windows systems, and was much more severe than Autorun exploits. It was discovered by a security firm that had never heard of VirusBlokAda. The drivers that were dropped onto targeted machines were signed with a legitimate digital certificate from a company called RealTek Semiconductor.