“It fills the airwaves with probes that request connections to nearby computing devices. When the specially devised requests reach a device using the BCM43xx family of Wi-Fi chipsets, the attack rewrites the firmware that controls the chip. The compromised chip then sends the same malicious packets to other vulnerable devices, setting off a potential chain reaction.”
Related posts:
"Boomerang Foreclosures" Are Back As Bernanke's Second Housing Bubble Begins To Pop
FinCEN Director Confirms IRS To Release Bitcoin Guidance
It Pays to Be a Bankster: Blankfein Buys $33 Million Hamptons Mansion
Ninth Circuit Gives the A-OK For Warrantless Home Video Surveillance
Another Sanctuary Joins the List
How to save 51 billion lives for 68 cents
Latest War is a Defense Bureaucrat’s Wet Dream
Arizona Man Holding Air Rifle Killed In His Own Backyard In Drug Raid
Michigan: Use Plate Scanners To Boot Cars With Overdue Library Books
Chicago trauma center age-restriction protesters accuse cops of roughing them up
Idaho Adopts Khan’s Free Online Academy
Florida Yacht Broker: Why Bitcoin Is Better Than Credit Cards
NYC Mayor Seeks to Ban Short-Stay Residential Room Hotels
Some Guy Always Gets Blamed for Lost Phones That He Never Stole Because of a Horrible Location Glitc...
Why was Raub Brandon Arrested?