Summary of Kim Zetter's Countdown to Zero Day

Summary of Kim Zetter's Countdown to Zero Day

Please note: This is a companion version & not the original book. Sample Book Insights: #1 In 2010, Sergey Ulasen, head of the antivirus division of a small computer security firm in Belarus, found a computer virus that used a rootkit to cloak itself and make it invisible to antivirus engines. It used a shrewd zero-day exploit to spread from machine to machine. #2 The mystery files came to the attention of VirusBlokAda when a reseller in Iran reported a persistent problem with a customer’s machine. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it. #3 The two hackers found a rootkit on the system in Iran that was designed to hide four malicious. LNK files. The malware appeared to be using an exploit to spread itself via infected USB flash drives. The rootkit prevented the. LNK files from being seen on the flash drive. #4 The LNK exploit attacked a fundamental feature of Windows systems, and was much more severe than Autorun exploits. It was discovered by a security firm that had never heard of VirusBlokAda. The drivers that were dropped onto targeted machines were signed with a legitimate digital certificate from a company called RealTek Semiconductor.


Auteur | Everest Media
Taal | Engels
Type | E-book
Categorie |

bol logo

Kijk verder

Boekomslag voor ISBN: 9780770436193
Boekomslag voor ISBN: 9780770436186
Boekomslag voor ISBN: 9780804166201
Boekomslag voor ISBN: 9781119442196
Boekomslag voor ISBN: 9798368954912
Boekomslag voor ISBN: 9781801072472


Boekn ©