The Hacker News — Most Popular Cyber Security, Hacking News Site: Search results for rootkit

The Real Story about rootkit.com ,HBGary E-mail !

The Real Story about rootkit.com ,HBGary E-mail !

February 11, 2011Mohit Kumar
The Real Story about rootkit.com , HBGary E-mail ! HBGary E-mail Viewer greg@hbgary.com Go back Original file: 27606 click here ...
More Hacking Groups Found Exploiting SMB Flaw Weeks Before WannaCry

More Hacking Groups Found Exploiting SMB Flaw Weeks Before WannaCry

May 19, 2017Mohit Kumar
Since the Shadow Brokers released the zero-day software vulnerabilities and hacking tools – allegedly belonged to the NSA's elite hac...
Necurs Rootkit infect 83,427 machines in November

Necurs Rootkit infect 83,427 machines in November

December 08, 2012Mohit Kumar
Rootkit named as "Necurs" infect 83,427 unique machines during the month of November 2012. It is a multi-purpose rootkits capab...
Jynx Kit (LD_PRELOAD) Userland Rootkit Released

Jynx Kit (LD_PRELOAD) Userland Rootkit Released

October 17, 2011Mohit Kumar
Jynx Kit (LD_PRELOAD) Userland Rootkit Released Jynx Kit is a LD_PRELOAD userland rootkit. Fully undetectable from chkrootkit and rootkith...
McAfee DeepSAFE - Anti-rootkit Security Solution

McAfee DeepSAFE - Anti-rootkit Security Solution

September 14, 2011Mohit Kumar
McAfee DeepSAFE - Anti-rootkit Security Solution McAfee previewed its DeepSAFE hardware-assisted security technology for proactively detec...
Reversing Stuxnet's Rootkit Into C++ , Download !

Reversing Stuxnet's Rootkit Into C++ , Download !

February 10, 2011Mohit Kumar
This is the first time Mr.  Amr Thabet from Egypt , student at Alexandria University Faculty of Engineering Mechanical Department  ,  reve...
SpyDLLRemover v4.0 - New Version Realeased

SpyDLLRemover v4.0 - New Version Realeased

November 20, 2010Mohit Kumar
“ SpyDllRemover is the specialized tool for detecting spyware & hidden Rootkit Dlls in the System. It can also detect & remove us...
New GhostHook Attack Bypasses Windows 10 PatchGuard Protections

New GhostHook Attack Bypasses Windows 10 PatchGuard Protections

June 22, 2017Swati Khandelwal
Vulnerabilities discovered in Microsoft PatchGuard kernel protection could allow hackers to plant rootkits on computers running the comp...
Here's How Hackers Can Disrupt '911' Emergency System and Put Your Life at Risk

Here's How Hackers Can Disrupt '911' Emergency System and Put Your Life at Risk

September 13, 2016Swati Khandelwal
What would it take for hackers to significantly disrupt the US' 911 emergency call system? It only takes 6,000 Smartphones. Yes, ...
How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard

How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard

February 23, 2016Swati Khandelwal
No matter how secure you think your computer might be, something malicious can always happen. As a Computer is an open book with right tools...
You can Hack into a Linux Computer just by pressing 'Backspace' 28 times

You can Hack into a Linux Computer just by pressing 'Backspace' 28 times

December 16, 2015Swati Khandelwal
So what would anyone need to bypass password protection on your computer? It just needs to hit the backspace key 28 times , for at l...
Powerful Linux Trojan 'Turla' Infected Large Number of Victims

Powerful Linux Trojan 'Turla' Infected Large Number of Victims

December 08, 2014Mohit Kumar
Security researchers have discovered a highly nasty Linux trojan that has been used by cybercriminals in state sponsored attack in order...
Linux Kernel Vulnerable to Privilege Escalation and DoS Attack

Linux Kernel Vulnerable to Privilege Escalation and DoS Attack

June 07, 2014Swati Khandelwal
Multiple flaws have been identified in Linux Kernel and related software could allow hackers to hack your Linux machines, shared hosting...
Sophisticated Russian Malware 'SNAKE'  and 'Turla' targets Governments and Military Networks

Sophisticated Russian Malware 'SNAKE' and 'Turla' targets Governments and Military Networks

March 07, 2014Swati Khandelwal
Last week, the Researchers at the German security company G Data Software have reported about the most complex and sophisticated rootkit...
Russian Web proxy with backdoors, Distributing malware

Russian Web proxy with backdoors, Distributing malware

October 09, 2012Mohit Kumar
Antivirus company Symantec has detected a malicious campaign in which hackers managed to deceive thousands of people allegedly signed by ...
Stuxnet 3.0 to be possibility released at MalCon?

Stuxnet 3.0 to be possibility released at MalCon?

November 15, 2011Mohit Kumar
Stuxnet 3.0 to be possibility released at MalCon ? Malware coders and security researchers are increasingly looking at MalCon malware conv...
DarkComet-RAT v4.0 Fix1 Released - Fully Cryptable

DarkComet-RAT v4.0 Fix1 Released - Fully Cryptable

August 21, 2011Mohit Kumar
DarkComet-RAT v4.0 Fix1 Released - Fully Cryptable DarkComet-RAT v4.0 Change log - DarkComet-RAT is now compiled on Delphi XE instead of...
GMER - Automating Rootkit Analyzer Released

GMER - Automating Rootkit Analyzer Released

July 11, 2011Mohit Kumar
GMER - Automating Rootkit Analyzer Released GMER  is an application that detects and removes rootkits . It scans for: hidden processes h...
APT Hackers Infect Routers to Covertly Implant Slingshot Spying Malware

APT Hackers Infect Routers to Covertly Implant Slingshot Spying Malware

March 09, 2018Swati Khandelwal
Security researchers at Kaspersky have identified a sophisticated APT hacking group that has been operating since at least 2012 without b...