Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The company, which has seen several "boycott Sony" weblogs appear on the internet in recent weeks, said in a statement that it was withdrawing the XCP technology, but must continue to defend itself from music pirates.
"We stand by content protection technology as an important tool to protect our intellectual property rights and those of our artists," the company said. "Nonetheless, as a precautionary measure, Sony-BMG is temporarily suspending the manufacture of CDs containing XCP technology."
Sony-BMG, the second-largest music label in the world, came under fire from consumers after Windows programming expert Mark Russinovich said on his weblog last month that Sony was using rootkit technology on CDs that could "phone home" users' personal information to Sony and its partners. Sony had claimed it was using the technology as a defense against illegal CD copying and also provided a patch to remove the application on its website.
Meanwhile, a poll conducted by Sophos revealed that 98 percent of business PC users believed Sony's digital rights management software is a security threat. The remaining 2 percent of users, as reported by SC Magazine on Monday, felt that the rootkit was a fair way to fight music piracy.
Russinovich said in his blog on Monday that rootkits become dangerous to users when combined with viruses seeking a way into the PC.
"The bottom line is that it's not rootkits themselves that are the problem," he said. "It's the inability to manage the objects that they hide that creates security, reliability and manageability problems."
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.