by Mike Masnick
Tue, Aug 28th 2007 8:23am
Sony is a big company, and various parts and subsidiaries are pretty much totally disconnected from other areas of the company, but given the disastrous PR that Sony had to deal with following the original rootkit debacle (which really was more of a BMG issue than a Sony one) you would think that perhaps someone higher up at Sony corporate would have sent around a memo or something to all the rest of Sony, suggesting that they check around and make sure that none of their products had rootkit-like functionality. Either that didn't happen... or someone didn't get the memo. It appears that a line of USB flash drive sticks that Sony sold have been discovered to install rootkit-like functionality that hides a folder on users' computers. And, of course, just like the original Sony rootkit, this hidden folder is perfect for malware writers to use as hiding places for their malware. While this one probably isn't as big a deal as last time around, let's see if Sony figured out that brushing it off because no one knows what rootkits are isn't exactly the best response to such a discovery. In the meantime, this highlights (once again) how weak many security programs are that they don't automatically look for this type of action in order to prevent it from happening in the first place.
If you liked this post, you may also be interested in...
- Samsung SmartThings Platform Latest To Highlight Internet Of Things Security Is A Joke
- Netflix CEO Says Annoyed VPN Users Are 'Inconsequential'
- Sony Finally Releases PS4 Remote Play For PC App That Isn't As Good As A Modder's App Is
- CNBC Asks Readers To Submit Their Password To Check Its Strength Into Exploitable Widget
- Sony On A Rampage Trademarking Common Terms: Attempted Registrations For 'Let's Play' And 'VRPG'