“It’s one thing for researchers in the lab to demonstrate viable firmware-infecting rootkits and ultra high-frequency networking techniques. But it’s another thing entirely to seamlessly fuse the two together and use the weapon in the real world against a seasoned security consultant. A USB stick infecting an array of computer platforms at the BIOS level rivals the payload delivery system found in the state-sponsored Stuxnet worm unleashed to disrupt Iran’s nuclear program. And the reported ability of badBIOS to bridge airgaps also has parallels to Flame, another state-sponsored piece of malware that used Bluetooth radio signals to communicate with devices not connected to the Internet.”
Related posts:
Anti-Theft Bitcoin Tracking Proposals Divide Bitcoin Community
USAF General: Nobody's Ready for the Killer Robot
"Planet Ponzi" by Mitch Feierstein
Get Your Money Out: “All Legal Bank Deposit Protections Are Now Officially Gone”
NSA Secretly Helped Convict Defendants in U.S. Courts
Groklaw Shuts Down Over U.S. Internet Surveillance
US Defense Dept. analyzing Bitcoin as potential terrorism threat
US's Man ElBaradei May Head Egypt
50 unmarked graves found on segregated reform school campus in Florida
Disturbing: Top Ten Cities for Meetings
The next frontier for 3D printing: drugs
Ben Swann Is Optimistic About the Internet Reformation
The Dark Side of the iPhone 5S Lines
Denmark’s Authorities: Bitcoin is Not Regulated Here
Former US Consumer Finance Watchdog Voices Support for Bitcoin