“It’s one thing for researchers in the lab to demonstrate viable firmware-infecting rootkits and ultra high-frequency networking techniques. But it’s another thing entirely to seamlessly fuse the two together and use the weapon in the real world against a seasoned security consultant. A USB stick infecting an array of computer platforms at the BIOS level rivals the payload delivery system found in the state-sponsored Stuxnet worm unleashed to disrupt Iran’s nuclear program. And the reported ability of badBIOS to bridge airgaps also has parallels to Flame, another state-sponsored piece of malware that used Bluetooth radio signals to communicate with devices not connected to the Internet.”
Related posts:
Court orders NYPD to pay $360,000 for raid that destroyed Occupy Wall Street library
A Paradigm Shift in Latin American Stocks
Defiling the Memory of President Eisenhower
Pay me in gold: Romania's new term as it gets more of Rosia Montana
Why Congresscriminals Want to "Privatize" Rather Than Abolish the TSA
Graham says FBI should confront people who view ‘Islamist’ websites
Israeli security strip searches Arab journalist at U.S. July Fourth party
Egyptian military vows lethal response ahead of nationwide ‘March of Anger’
Security researchers announce “first practical” SHA-1 collision attack
Obama Narrows Field for Fed Chairman to 3
Berkeley, CA declares 'climate emergency', calls for 'humane' population control
Egyptian Revolution: What You're Not Being Told
California Good Samaritan Drug Overdose Bill Signed Into Law
Free at Last! Detroit Stiffs the Municipal Unions.
Confidential Wikileaks Cable (US Embassy in Nicosia) on Russian Money in Cyprus