Which of these would be the best description of a security vulnerability that modifies core system files and can be invisible to the operating system?
B) Phishing attempt
E) If you stand very still, you can see it moving around
The answer: C) Rootkit
A rootkit is designed to embed itself as deep as possible in the operating system. Some rootkits can exist in the kernel, making them effectively invisible to the operating system itself.
Want to know more? Watch “Common Security Threats.”
There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.