Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> drive-by exploit

It's worth noting that UAC is not a security boundary[1]. Sure, a safeguard mechanism, but not a security feature against stealth rootkits trying to escalate from non-privileged environment.

[1]: https://security.stackexchange.com/questions/189491/microsof...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: