Editor's Picks If you're still a little fuzzy about what rootkits are, here's a quick explanation from TechRepublic contributor Mike Mullins: "To clarify, a rootkit is not an exploit -- it's the code or program an attacker leaves behind after a successful exploit." Learn more about rootkits in these blog posts:
Windows rootkits 101 (Mike Mullins) UNIX/Linux rootkits 101 (Chad Perrin) Rootkits 201 (Chad Perrin) Then, read industry research about rootkits, as well as other security topics. Rootkits: What They Are and How to Fight Them (Webroot Software) Rootkits - The New Wave of Invisible Malware is Here (Trend Micro) The Art of Rootkits (Infosecwriters.com) Rootkits: The Growing Threat (McAfee) When Malware Meets Rootkits (Symantec) TechNet Webcast: Rootkits in Windows (Level 300) (Microsoft) Rootkit Evasiveness: Malware's Best Friend, Windows' Worst Foe (Agnitum) Linux RootKits For Beginners - From Prevention to Removal (SANS Institute) Detect rootkits and rootkit behavior with these techniques (Addison Wesley Professional) Rootkits: Digital Rights Management, Spyware, and Security (Institute of Electrical and Electronics Engineers) Recently added security papers The 2007 Security Threat Report (Sophos Software) 10 Steps To Secure Your SQL Server (Idera) Outbound E-mail and Content Security in Today's Enterprise, 2007 (Proofpoint) Anti-spam Defense: Is a Second Layer of Spam Protection Right for You? (Proofpoint) Newsletters Automatically sign up for related newsletters Security Solutions - Get hands-on advice for locking down your systems. IT Security NetNote - Receive a roundup of the latest security alerts, fixes, and tricks. |