Security news, views and insight from the ESET experts
Alexandr Matrosov summarizes the evolution of complex threats using hidden storage, as discussed in his presentation with Eugene Rodionov at Virus Bulletin 2012.
Why the ZeroAccess rootkit family modifications are important to the end user.
New versions of the Zeroaccess bootkit demonstrate alternative approaches to distribution and to bootkit infection on 32- and 64-bit Windows.
A new TDL4 sample includes novel privilege escalation mechanisms in the dropper and changes to the hidden storage system.
ESET researchers examine the evolution of bootkit threats targeting 64-bit Windows over 2011.
Automatically receive new posts via email: