Summary of Kim Zetter's Countdown to Zero Day
Everest Media
Availability:
Ebook in EPUB format. Available for immediate download after we receive your order
Ebook in EPUB format. Available for immediate download after we receive your order
Publisher:
Everest Media LLC
Everest Media LLC
DRM:
Watermark
Watermark
Publication Year:
2022
2022
ISBN-13:
9781669385288
Description:
Please note: This is a companion version & not the original book.
Sample Book Insights:
#1 In 2010, Sergey Ulasen, head of the antivirus division of a small computer security firm in Belarus, found a computer virus that used a rootkit to cloak itself and make it invisible to antivirus engines. It used a shrewd zero-day exploit to spread from machine to machine.
#2 The mystery files came to the attention of VirusBlokAda when a reseller in Iran reported a persistent problem with a customer’s machine. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.
#3 The two hackers found a rootkit on the system in Iran that was designed to hide four malicious. LNK files. The malware appeared to be using an exploit to spread itself via infected USB flash drives. The rootkit prevented the. LNK files from being seen on the flash drive.
#4 The LNK exploit attacked a fundamental feature of Windows systems, and was much more severe than Autorun exploits. It was discovered by a security firm that had never heard of VirusBlokAda. The drivers that were dropped onto targeted machines were signed with a legitimate digital certificate from a company called RealTek Semiconductor.
Sample Book Insights:
#1 In 2010, Sergey Ulasen, head of the antivirus division of a small computer security firm in Belarus, found a computer virus that used a rootkit to cloak itself and make it invisible to antivirus engines. It used a shrewd zero-day exploit to spread from machine to machine.
#2 The mystery files came to the attention of VirusBlokAda when a reseller in Iran reported a persistent problem with a customer’s machine. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.
#3 The two hackers found a rootkit on the system in Iran that was designed to hide four malicious. LNK files. The malware appeared to be using an exploit to spread itself via infected USB flash drives. The rootkit prevented the. LNK files from being seen on the flash drive.
#4 The LNK exploit attacked a fundamental feature of Windows systems, and was much more severe than Autorun exploits. It was discovered by a security firm that had never heard of VirusBlokAda. The drivers that were dropped onto targeted machines were signed with a legitimate digital certificate from a company called RealTek Semiconductor.
Ebook Preview