“It’s one thing for researchers in the lab to demonstrate viable firmware-infecting rootkits and ultra high-frequency networking techniques. But it’s another thing entirely to seamlessly fuse the two together and use the weapon in the real world against a seasoned security consultant. A USB stick infecting an array of computer platforms at the BIOS level rivals the payload delivery system found in the state-sponsored Stuxnet worm unleashed to disrupt Iran’s nuclear program. And the reported ability of badBIOS to bridge airgaps also has parallels to Flame, another state-sponsored piece of malware that used Bluetooth radio signals to communicate with devices not connected to the Internet.”
Related posts:
Zimbabwe threatening privacy rights with new SIM registration database
Massachusetts Crime Lab Investigation; 34,000 Cases Tainted
Human-to-Rat, Brain-to-Brain Control Achieved By Neuro Scientists
China Bans People With "Bad Social Credit" From Planes, Trains
Bernanke’s Bubble: A Counterfeit Boom Based on Counterfeit Money
Number Of Nation's Sheriffs Refusing To Enforce Unconstitutional Gun Laws Snowballs
SWAT team sent to home of CNN’s Wolf Blitzer
Israel and Iran: A love story?
Dallas freezes pension fund withdrawals, plans bailout with 130% tax increase
Price of Lunch with Warren Buffett Crashes
Stop CISA, Broad "Cybersecurity" Surveillance Legislation
Mike Hearn, Bitcoin Developer - Turing Festival 2013
Putin Lectures Obama on the Need for Greater Privacy
Trezor to Ship Physical Bitcoin Wallets in January
Is Actor Johnny Revilla Stateless?