The name “rootkit” derives from Unix and Linux operating systems, where the most privileged account admin is called the "root". Once they gain unauthorized access to computers, rootkits enable cybercriminals to steal personal data and financial information, install malware or use computers as part of a botnet to circulate spam and participate in DDoS (distributed denial of service) attacks. Rootkits are adept at concealing their presence, but while they remain hidden, they are active. Although most rootkits affect the software and the operating system, some can also infect your computer’s hardware and firmware. A rootkit is a type of malware designed to give hackers access to and control over a target device.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |