• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Microsoft Malware Protection Center provides report on Rootkits

Microsoft Malware Protection Center provides report on Rootkits

2012-10-19 by Jason

Rootkits have gone from theoretical to everyday infections in a pretty short time. Tools like TDSSKiller, Sophos Antirootkit, Combofix, and others all help in the battle against these sophisticated infections but the best solution is to avoid getting one installed in the first place. To better understand the threat that rootkits pose, I recommend reading the threat report that the Microsoft Malware Protection Center just published today.

“The Microsoft Malware Protection Center (MMPC) has published a new threat report on Rootkits and how they work.  This threat report is recommended reading for those people looking to better understand how malware families use rootkits to avoid detection and how to protect themselves from this type of threat.”

The report covers the purpose of rootkits and their etymology, how attackers use rootkits, the scope of the rootkit problem, notable malware families that use rootkits, and protection against rootkits and malicious/potentially unwanted software.

A rootkit works by essentially inserting itself into a system to moderate – or filter – requests to the operating system. By moderating information requests, the rootkit can provide false data, or incomplete data, to utterly corrupt the integrity of the affected system. This is the key function of a rootkit and explains why rootkits are a serious threat – after a rootkit is installed, it is no longer possible to trust any information that is reported back from the affected computer.

You can find out more from the Microsoft Security blog, which announced the report’s release. You can jump straight to the report (.pdf) by clicking the image below.

Filed Under: Security and Privacy

Trending

  • Apple launches OS X Yosemite, iMac with Retina 5K, iPad Air 2, iPad Mini 3, and updated Mac Mini
    In Hardware, Gadgets, and Products, Operating Systems
  • First Patch Tuesday of 2013 brings updates from Microsoft, Adobe, and Mozilla
    In Security and Privacy, Software
  • Amazon introduces new Kindles, Kindle Fires, and Fire OS
    In Hardware, Gadgets, and Products

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • What is the AllJoyn Router Service on Windows 10? What is the AllJoyn Router Service on Windows 10?
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • How a DirecTV bill really works in 2015 How a DirecTV bill really works in 2015
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in