
“It fills the airwaves with probes that request connections to nearby computing devices. When the specially devised requests reach a device using the BCM43xx family of Wi-Fi chipsets, the attack rewrites the firmware that controls the chip. The compromised chip then sends the same malicious packets to other vulnerable devices, setting off a potential chain reaction.”
Related posts:
Louisiana: Traffic Camera Company Sues Client Over Cash
Christian & gun owner in the crosshairs for radio call-in
Topless Women Marching To Times Square For Topless Day
DHS’ Napolitano Leaves Legacy of Corruption, Lies, Lawsuits, and Waste
Chicago Is Trying to Pay Down Its Debt by Impounding Innocent People’s Cars
Samsung confirms it is making ASIC chips for cryptocurrency mining
Sears Plans To Retrofit 2,500 "Ghostbox" Stores As Data Centers
Men busted in Ukraine’s “fake murder” ruse turn out to be Ukrainian Intelligence
Arizona Man Winds Up Jailed, Unemployed and Homeless After Photographing Courthouse
Extortion, Police Raids and Secrecy: The Venezuelan Bitcoin Mining World
After the Silk Road Shut Down, Bitcoin Will Only Get Bigger
Oppose the War: Send Congress a History Lesson
New Jersey Requires a Permit To Preach In Public
Pre-Internet Laws Are Jeopardizing Today's Electronic Privacy
Family of American subjected to indefinite detention pleads for international human rights review