{"id":5796,"date":"2006-01-17T11:42:10","date_gmt":"2006-01-17T10:42:10","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=5796"},"modified":"2006-01-17T11:42:10","modified_gmt":"2006-01-17T10:42:10","slug":"kaspersky-lab-utilise-aussi-une-technologie-de-rootkit","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=5796","title":{"rendered":"Kaspersky Lab utilise aussi une technologie de rootkit"},"content":{"rendered":"<p>L&rsquo;\u00e9diteur russe Kaspersky Lab, sp\u00e9cialis\u00e9 dans la s\u00e9curit\u00e9 informatique, a r\u00e9pondu aux all\u00e9gations selon lesquelles il utiliserait une technologie de rootkit susceptible d&rsquo;exposer les utilisateurs \u00e0 des risques de piratage.<\/p>\n<p>Eugene Kaspersky, fondateur de la soci\u00e9t\u00e9, a d\u00e9clar\u00e9 sur un blog que la technologie utilis\u00e9e pr\u00e9sentait des \u00ab\u00a0diff\u00e9rences subtiles\u00a0\u00bb avec celle qui a caus\u00e9 tant de soucis \u00e0 Sony BMG.<\/p>\n<p>Selon Kaspersky, la technologie iStreams, qui est \u00e9galement utilis\u00e9e par Symantec, n&rsquo;est pas exploitable par des hackers contrairement \u00e0 ce que craignait le chercheur Mark Russinovich.<\/p>\n<p>M\u00eame si un de ces malwares arrivait \u00e0 s&rsquo;infiltrer, le logiciel le rep\u00e9rerait au d\u00e9marrage et l&rsquo;\u00e9liminerait tel un virus.<\/p>\n<p>Selon l&rsquo;\u00e9diteur, la seule et unique raison de cet abandon est que iStreams est trop long \u00e0 d\u00e9sinstaller.<\/p>\n<p>Fanch<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;\u00e9diteur russe Kaspersky Lab, sp\u00e9cialis\u00e9 dans la s\u00e9curit\u00e9 informatique, a r\u00e9pondu aux all\u00e9gations selon lesquelles il utiliserait une technologie de rootkit susceptible d&rsquo;exposer les utilisateurs \u00e0 des risques de piratage. Eugene Kaspersky, fondateur de la soci\u00e9t\u00e9, a d\u00e9clar\u00e9 sur un blog que la technologie utilis\u00e9e pr\u00e9sentait des \u00ab\u00a0diff\u00e9rences subtiles\u00a0\u00bb avec celle qui a caus\u00e9 tant [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-5796","post","type-post","status-publish","format-standard","hentry","category-hackers"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/5796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5796"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/5796\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}