Tag Archive for: Leverages

New Linux rootkit leverages GPUs for stealth

A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.

The rootkit, called Jellyfish, is a proof of concept designed to demonstrate that completely running malware on GPUs (graphics processing units) is a viable option. This is possible because dedicated graphics cards have their own processors and RAM.

Such threats could be more sinister than traditional malware programs, according to the Jellyfish developers. For one, there are no tools to analyze GPU malware, they said.

Also, such rootkits can snoop on the host’s primary memory, which is used by most other programs, via DMA (direct memory access). This feature allows hardware components to read the main system memory without going through the CPU, making such operations harder to detect.

To read this article in full or to leave a comment, please click here

Network World Security

How Android Leverages Open Hardware Without Compromising Security – ARC


ARC

How Android Leverages Open Hardware Without Compromising Security
ARC
Because of the media echo chamber Google started a public dialog about the state of Android security to for the sake of transparency. In doing so, Google did something that no other mobile or PC company has done before. When Google first spoke openly …

and more »

“android security” – read more

Centre for Internet Security leverages FiberLink MaaS360 – Telecompaper (subscription)

Centre for Internet Security leverages FiberLink MaaS360
Telecompaper (subscription)
Provider of cloud-based enterprise mobility management (EMM), FiberLink and the Centre for Internet Security (CIS) have announced a new agreement through which government agencies and educational institutions can purchase MaaS360 through 

“internet security” – read more

New Attack Leverages Mobile Ad Network to Deliver Android Malware – Threatpost

New Attack Leverages Mobile Ad Network to Deliver Android Malware
Threatpost
That problem is now moving to the mobile Web, and researchers at Palo Alto Networks have uncovered a new malware strain that is being installed with legitimate Android apps and then connecting back to mobile ad networks in the background as part of a

android botnet – read more