kernel mode rootkits

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name

Stop Stealth Attacks with Endpoint Security Beyond the OS

Published By: McAfee     Published Date: Feb 06, 2013
Learn how McAfee Deep Defender version 1.0 targets the more dangerous kernel mode rootkits.
Tags : 
rootkit, deep defender, application control, change control, black listing, white listing, security compliance, trusted memory services layer
    
McAfee

Fight Back Against Stealthy Attacks with Security Beyond the OS

Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee

A New Approach to IT Security: Prevent Stealthy Threats and Improve Security Management

Published By: McAfee     Published Date: Feb 06, 2013
Itís a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee

Stealthy Threats: Driving a New Approach to Security

Published By: McAfee     Published Date: Feb 06, 2013
Prevent rootkits and other stealthy threats with integrated solutions from Intel and McAfee that deliver embedded security to protect beyond the operating system.
Tags : 
stealthy threats, malware, stealth crimeware, rootkits, cybercrime, stuxnet, zeus, zero-day threats
    
McAfee
Search      

Add Research

Get your company's research in the hands of targeted business professionals.