As a result of its decision to include a rootkit-based copy protection system in some of its CDs, Sony had to pay $1.5 million in civil penalties and refund users whose PCs were damaged by the software last year. However, it seems that wasn't enough to make the company turn its back on rootkits.
The folks at F-Secure have discovered that software bundled with Sony's MicroVault USB thumb drives installs a driver intended to conceal files in the host system's Windows directory. Said directory reportedly becomes invisible to the Windows API and some anti-virus software, which could potentially allow malware to exploit it in order to avoid detection.
According to F-Secure, Sony relies on the cloaking functionality to conceal data used by the thumb drives' fingerprint authentication system. (Thanks to Slashdot for the tip.)
|Leica M10 further refines rangefinders for the digital age||10|
|NZXT adds purple-and-white finishes to its hardware catalog||8|
|Asus shows off Zenbook 3 Deluxe UX490A in detail||38|
|Tom's Hardware hammers an Intel 600p SSD for science||27|
|Antec Cube Mini-ITX chassis gets EKWB-certified||1|
|iBuypower Snowblind is a fresh take on case side panels||15|
|Radeon 17.1.1 drivers bring support for Resident Evil 7||16|
|NexDock offers a home for Intel Compute Cards||10|
|Imagination Technologies freshens up mid-range PowerVR GPUs||5|