As a result of its decision to include a rootkit-based copy protection system in some of its CDs, Sony had to pay $1.5 million in civil penalties and refund users whose PCs were damaged by the software last year. However, it seems that wasn't enough to make the company turn its back on rootkits.
The folks at F-Secure have discovered that software bundled with Sony's MicroVault USB thumb drives installs a driver intended to conceal files in the host system's Windows directory. Said directory reportedly becomes invisible to the Windows API and some anti-virus software, which could potentially allow malware to exploit it in order to avoid detection.
According to F-Secure, Sony relies on the cloaking functionality to conceal data used by the thumb drives' fingerprint authentication system. (Thanks to Slashdot for the tip.)
|Aerocool starts Project 7 with a flurry of case and cooling gear||5|
|NTFS filesystem bug could crash Windows 7, 8, and 8.1||36|
|Enermax NeoChanger is both a pump and a reservoir||13|
|Acer sprinkles the Iconia Tab 10 with quantum dots||9|
|Deals of the week: lots of motherboards and a cheap GTX 1080||20|
|MSI Vortex G25VR, Infinite-A, and Pro 20EX PCs fill all niches||2|
|Nvidia unveils the GeForce GTX Battlebox certification program||31|
|Acer Spin 1 and Nitro 5 laptops are ready for school season||13|
|Ryzen AGESA 18.104.22.168 exposes more memory overclocking options||68|
|Nah, giving it up with no resistance is downloading Chrome.||+8|