
“It fills the airwaves with probes that request connections to nearby computing devices. When the specially devised requests reach a device using the BCM43xx family of Wi-Fi chipsets, the attack rewrites the firmware that controls the chip. The compromised chip then sends the same malicious packets to other vulnerable devices, setting off a potential chain reaction.”
Related posts:
China Is Moving in the Right Direction on Tariffs
Robo-bulldozers guided by drones are helping ease Japan's labor shortage
Earlier This Week, UK Government Agents Held a Conference on Bitcoins
Newly leaked NSA program sees 'nearly everything' you do
Connecticut: “No Guns, No Gold”
Homeland Security Fusion Centers Will Share Intelligence Horizontally
Parking Agent Hogs Handicapped Spot, Gets Sacked
Bank of Finland Report Calls Digital Currency a “Fallacy”
IRS facing class action suit for medical records theft
White House: Obama has no plans to reschedule marijuana
10 Freest States For Homeschooling
Banana Republics Have Nothing on New York City
World's Largest LED Hydroponic Farm Used to Be a Sony Factory
Bruce Schneier: Economist Detained for Doing Math on an Airplane
Snowden Leak: U.S. Paying Contractors Ten Times as Much as Bureaucrats