Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Privacy

Submission + - Forensics: "File System Spoofing." (forensicswiki.org)

iiiears writes: Currently, Casper may select fake root file system image on evidentiary media (e.g. HDD), because there are no authenticity checks performed (except optional UUID check for a possible live file system), and this fake root file system image may be used to execute malicious code during the boot with root privileges.
Security

Submission + - Hardware Threat BIOS Rootkit. "Mebromi" (webroot.com)

iiiears writes: Mebromi and contains a bit of everything: a BIOS rootkit specifically targeting Award BIOS, a MBR rootkit, a kernel mode rootkit, a PE file infector and a Trojan downloader. At this time, Mebromi is not designed to infect 64-bit operating system and it is not able to infect the system if run with limited privileges.
Security

Submission + - Malware Deniers (mrpogson.com)

iiiears writes: Ed Bott has been around a while. He did some useful work tracking down a report that 50% of PCs in the world were infected with malware.

Slashdot Top Deals

To invent, you need a good imagination and a pile of junk. -- Thomas Edison

Working...