According to foreign media reports, at the Black Hat security conferenc on Thursday, according to relevant security software experts, the computer installed anti-virus rogue software will also generate security vulnerabilities. This information has been confirmed by two senior security experts, Alfredo Ortega and Anibal Sacco.
According to an analysis by Ivan Arce, Chief Technology Officer of the core security company, computers infected with malicious programs will be infected with anti-virus software, interfering with its normal function, as a result, hackers gain control over their computers. Then, hackers can modify computer settings and even uninstall anti-virus software at will. Therefore, even if users install some security software in advance, the computer cannot be prevented from being attacked by malicious software. Therefore, solving this security vulnerability becomes a top priority.
In this regard, the Black Hat Security Conference proposed the latest response, that is, the latest Comupturace Software launched by a Software company in Vancouver (Absolute Software Corp.
The Comupturace software is expensive and is specially designed to deal with such malicious programs. Comupturace software is pre-installed on the computer's motherboard before the computer leaves the factory, so it cannot be deleted even if the software specifically uninstalled.
Due to the existence of Comupturace software, some data can be remotely implanted into the lost computer. Then the computer will report the relevant information.
At the same time, Ivan Arce also pointed out that as long as the user has the correct method of use, the user can also disable the software. He did not disclose more details.
It is reported that Roel Schouwenberg, a senior research expert at Kaspersky Lab, believes that the most fundamental aspect of this hacker attack is actually the same as in the past, it still tries to implant malware and malware into the computer during user download. The emergence of high-risk vulnerabilities poses a great challenge to network security. Netizens need to improve vigilance against unknown source information