It has always been in the interest of malware authors to hide their malware on an infected machine. They don’t want to make it easy for security vendors to find and remove their files. Rootkits are one of the most sophisticated methods malware authors use to stay undiscovered.
A rootkit is a tool that allows an attacker to hide a threat on a computer. Rootkits almost never work alone. Instead, an attacker will deliver both a malicious program (e.g., spyware) and an accompanying rootkit when they infect a new computer. The job of the rootkit is to hide telltale signs of both itself and...
Hi, I’m Joe Keehnast, product manager for Norton Anti-Theft, a new Beta service from Norton. Norton Anti-Theft is a new service that gives you a way to track the devices you have, protect the data they house, and get them back in the event that they are ever lost or stolen. Protecting users from the threat of physical device loss and theft is somewhat of a new area for us and we believe this new service is a great addition to our Norton Everywhere vision of protecting you and your data on any device.
So what can Norton Anti-Theft do for you?
Let’s say you have lost a computer or it has...