Know your enemy - protect yourself - Microsoft Malware Protection Center | 21st Century Learning and Teaching | Scoop.it

Of the many weapons and tricks in an attacker’s arsenal, none is more dangerous or insidious than the ability to hide and continuously compromise a system from within.

 

This is the role of a rootkit. Malware uses rootkits, or rootkit functionality, in order to hide their presence on an affected computer and thus impede their removal.

 

===> Once compromised by a rootkit, any information returned by an affected system can no longer be trusted and must be regarded as suspect (which is exactly how they hide themselves and their components from you - by modifying requests for information that might give them away). <===

 

===> Know your enemy and protect yourself by learning about these threats. <===

 

You can download the paper here [PDF]:

http://download.microsoft.com/download/D/2/C/D2C47748-0310-4D6F-AC72-3D298BE58108/Microsoft%20Malware%20Protection%20Center%20Threat%20Report%20Rootkits_English.pdf

 

Read more:

http://blogs.technet.com/b/mmpc/archive/2012/10/19/know-your-enemy-protect-yourself.aspx?utm_source=dlvr.it&amp;utm_medium=twitter