by Mike Masnick
Fri, Mar 12th 2010 6:38am
Update: As lots of folks are pointing out in the comments, this appears to have been included by some third party or disgruntled employee or something, rather than Energizer itself. Energizer has recalled the products and is investigating. Apologies for suggesting that this may have been intentional on Energizer's part. The original post follows: Someone, who prefers to remain anonymous, alerts us to the news that Symantec has discovered that a USB battery charger from Energizer installs a dangerous rootkit after installing the required driver. You would think that legit companies would know better than to install a secret rootkit after the Sony rootkit fiasco from a few years back. This particular rootkit constantly listens for commands that could allow a computer to secretly execute files or even send computer files to a remote computer. Not exactly the kind of stuff you want installed on your computer. The Energizer Bunny might keep going and going and going, but there are some things it's not supposed to do...
If you liked this post, you may also be interested in...
- Why Even Justified Criticisms Of GNU Privacy Guard Miss The Point
- How Hillary Clinton Exposed Her Emails To Foreign Spies... In Order To Hide Them From The American Public
- NSA Director: If I Say 'Legal Framework' Enough, Will It Convince You Security People To Shut Up About Our Plan To Backdoor Encryption?
- Thought Komodia/Superfish Bug Was Really, Really Bad? It's Much, Much Worse!
- Lenovo CTO Claims Concerns Over Superfish Are Simply 'Theoretical'