[TechRepublic] Forged memory fools antimalware

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | May 03, 2011

Forged memory fools antimalware: A new development in rootkits

Malware developers are deploying a new stealth technology. Michael Kassner interviews an expert who explains how some rootkits forge memory to outwit antimalware programs. Read more

Resource of the day

Recommendations for Implementing Cloud Security

Delivering IT services via the cloud makes it hard to maintain data integrity and privacy, support data and service availability, and stay compliant. Read this white paper to learn the latest measures and best practices for cloud security.


What to do about the PlayStation Network breach

The PlayStation Network security compromise is big news, but many may not know what to do about it. A brief overview of Sony's history on such matters may prove helpful. Read more

Facebook is not the real privacy threat

Facebook is certainly a good example of a bad approach to privacy policy, but the dangers of Facebook depend entirely on our own failures. Read more

Are you at risk for being accused of a cybercrime?

IT pros have access to sensitive information and systems that can make them the target in cybercrime investigations. Make sure you know the laws and how to protect yourself if you are implicated.... Read more

Additional TechRepublic resources

 

Configure SNMP monitoring with network devices in SCOM 2007 R2

System Center Operations Manager 2007 R2 can discover and provide operational monitoring of network infrastructure, such as routers and switches. Learn how to set up a network device monitor. Read more

Are antivirus applications necessary on the Android mobile platform?

To install antivirus applications or not to install antivirus apps is a conundrum that confounds some Android mobile users. Jack Wallen weighs in on this debate. Read more

Pop Quiz: Windows chkdsk command

Do you know which chkdsk stage verifies indexes or which switch fixes errors? Test your knowledge of the Windows chkdsk command. Read more

Featured multimedia

 

How Google secures its data centers (photos)

Google has opened the doors to one of its data centers to show how it protects customer data View on site


Fractal image galleries

Fractal art from the XaoS zoomer

Chaoscope fractals showcase the beauty of chaos

Flame Fractals continue to dazzle

Incredible flame fractals take you through the wormhole


Today's recommended downloads

Gain Control of your Infrastructure (American Power Conversion (APC))

Spend Time Using Technology, Not Implementing It (IBM)

Strategies for deploying blade servers in existing data centers (American Power Conversion (APC))

Improving Airflow in a Raised-Floor Data Center (American Power Conversion (APC))

Effectively Balancing Speed, Quality, and Cost Metrics (Citrix Online)


Finding uses for the iPad 2: A skeptic gives it another shot

Vincent Danen once pronounced the iPad a "giant iPod" and passed on the original device; however, caving to pressure on the iPad 2, he revises his opinion on its usefulness.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment