Sport & Auto
- About Future
- Digital Future
- Cookies Policy
- Terms & Conditions
- Investor Relations
- Contact Future
However, in a follow-up analysis two days later, F-Secure also points out that Sony has learned a few things from its 2005 fiasco:
Unfortunately, the driver can be used to hide any (!) folder (McAfee's AVERT Labs used it to hide the Windows folder and all subfolders). How long will it be before some malware writer comes up with a nasty piece of "ransomware" to take advantage of this 'feature?'
Right now, the way that some rootkits are designed and used by legitimate companies makes it easy for the bad guys to abuse a rootkit by using it to attack users' computers - and users who don't know about a particular rootkit (and don't use anti-rootkit programs) are sitting ducks. Here's my modest proposal to set up a "Bill of Rootkit Rights" for PC users:
Sony's Micro Vault driver quite clearly fails to meet most of these proposed rules - especially the last one.
Some may argue that this level of disclosure would harm the effectiveness of a rootkit designed to perform legitimate tasks. I disagree: right now, the bad guys know about what rootkits can do - and all I'm advocating is the same level of knowledge for legitimate users. Nobody wants to install a program that can be turned into a weapon against their system or their information.
Discover what features are great, what works, and what needs work in Windows Vista with Mark's new book Maximum PC Microsoft Windows Vista Exposed. It's now available at Amazon.com and other fine bookstores.