
“It’s one thing for researchers in the lab to demonstrate viable firmware-infecting rootkits and ultra high-frequency networking techniques. But it’s another thing entirely to seamlessly fuse the two together and use the weapon in the real world against a seasoned security consultant. A USB stick infecting an array of computer platforms at the BIOS level rivals the payload delivery system found in the state-sponsored Stuxnet worm unleashed to disrupt Iran’s nuclear program. And the reported ability of badBIOS to bridge airgaps also has parallels to Flame, another state-sponsored piece of malware that used Bluetooth radio signals to communicate with devices not connected to the Internet.”
Related posts:
Meet the traveling Bitcoin ATM
MyRA: "A Start To A Secure Retirement", Promises Treasury Secretary
Rep holds up vodka and steak on House floor to shame food stamp opponents
"Czars" No More: New Mexico Bans Policing for Profit
Decorated Combat Veteran Arrested: Charged With 5 Felonies For Possession of AR Magazines
Teen Rots in Jail for Facebook Joke; Cop Who Talked About Killing Michelle Obama Gets Vacation
Terrible News: Mark Zuckerberg Does D.C.
South Korea Toughens Up Rules On Overseas Accounts
Has Bitcoin Finally Arrived?
Investigative journalist Ben Swann weighs in on push to Syria war
No Place to Hide: We’re All Suspects in Barack Obama’s America
465,000 patients have implanted pacemakers with critical security vulnerability
California Good Samaritan Drug Overdose Bill Signed Into Law
UK porn filter blocks League of Legends update for 'sex' in file name
Time to Sequester Air Force One Vacation Flights