Rootkits and Other Stealthy Threats Changing IT Security

Rootkits and other stealthy threats have significantly changed the threat landscape with their ability to evade traditional security measures. Because these threats are able to load before the operating system, it means they load before antivirus protection. Two threats in particular represent the new reality of today’s crimeware. The first, Stuxnet, brought a new level of innovation to stealth te...chniques by combining zero-day vulnerabilities, rootkits, and stolen digital certificates. The next threat is Zeus, a commercial crimeware toolkit that enables any cybercriminal to develop advanced malware. Zeus works much like a software development kit, complete with a formal release, beta testing, and an easy-to-use graphical toolkit. If and when threats like Stuxnet combine with the programming tools of Zeus, there will be a far greater threat to the enterprise. Until then, the best defense against stealthy threats is to prevent them from gaining entry into your systems. In the industry’s first proactive security approach, Intel and McAfee are delivering next-generation security that is uniquely designed to help you stay one step ahead of today’s threats. With more than two decades of experience defending against cybercrime, Intel and McAfee researchers are helping the industry reenvision how to detect and block stealthy malware. The two companies are working together to combine world-class processor technology and leading security software to stay in front of crimeware innovation—even as it moves from PCs and mobile devices to industrial controls and other intelligent clients.

Related Videos