This resource is no longer available

Rootkits: The Power and The Gory

Cover

Where did rootkits originate? While rootkits are nothing new, they have recently become more sophisticated and threatening to help spread and hide malware. 

Watch this video to find out more information on how cybercriminals are using rootkits to exploit businesses sensitive information. Uncover how you can prevent these stealthy techniques from damaging your company by watching this video now. 

Vendor:
Intel and McAfee
Premiered:
Oct 29, 2012
Format:
Video
Type:
Webcast
Language:
English

This resource is no longer available.