Monitoring users' data, with or without installing rootkits, continues in the software industry. |
One way we have seen rootkits hide themselves on 64-bit systems is bypassing driver signing checks done by winload. |
Enhanced detection and cleanup addresses rootkits and other sophisticated threats. |
Powerful anti-spyware technology guards your personal information and privacy against spyware, rootkits, and other malicious software. |
The most dangerous rootkits dig deep into a computer's operating system to hide the fact that certain software files exist or that the computer is performing certain functions. |
This is a disturbing trend as rootkits can be very difficult to detect, and can be used to hide other types of malware. |