
“It fills the airwaves with probes that request connections to nearby computing devices. When the specially devised requests reach a device using the BCM43xx family of Wi-Fi chipsets, the attack rewrites the firmware that controls the chip. The compromised chip then sends the same malicious packets to other vulnerable devices, setting off a potential chain reaction.”
Related posts:
The Dismal State of Police Body-Camera Laws
A Sure-Fire Way to Control the Price of Bitcoin?
In Stamps We Trust: Paving the Road to Prosperity with Food Stamps
Cops Find Less than 1 Oz of Weed at a Party, Throw Over 70 People in Jail
Australia: Another Toll Road Goes Bankrupt
Cop Violently Slams Handcuffed School Girl Into Concrete; No Drugs Found
Apple, Inc. spent $18B to buy back 31.7 million shares of AAPL in Q2
Jordan wargames: Patriot batteries, F-16s and 4,500 US troops near Syrian border
American Muslims Were Put On No-Fly List By FBI For Refusing to Inform
The U.S. Dollar’s Days are Numbered …
Why We're Not Sneering at the Averages
Military-Industrial Complex Presstitutes Get SMACKED DOWN By A Real Journalist
Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”
NSA admits listening to U.S. phone calls without warrants
LAPD Detains Photographer For 'Interfering' With Police From 90 Feet Away