
“It’s one thing for researchers in the lab to demonstrate viable firmware-infecting rootkits and ultra high-frequency networking techniques. But it’s another thing entirely to seamlessly fuse the two together and use the weapon in the real world against a seasoned security consultant. A USB stick infecting an array of computer platforms at the BIOS level rivals the payload delivery system found in the state-sponsored Stuxnet worm unleashed to disrupt Iran’s nuclear program. And the reported ability of badBIOS to bridge airgaps also has parallels to Flame, another state-sponsored piece of malware that used Bluetooth radio signals to communicate with devices not connected to the Internet.”
Related posts:
Taxing Cannabis Consumers Into the Black Market, Waiting for Medicine
Is Obamacare About to Kill Hotel Room Service?
New Dodd-Frank regs halt margin trading on precious metals in the U.S.
Police Shoot Dog & Police Dept Says Case ‘Closed.’
Google ordered to remove links to stories about Google removing links to stories
Blueseed Entrepreneur Cruise Ship Continues Full Steam Ahead with Bitcoin Funding
Twitter IPO filing prompts mistaken buying rush of worthless TWTRQ stock
Is Spain Preparing For Its Own Deposit "Levy"?
Disturbing: Top Ten Cities for Meetings
US farmers challenging Monsanto patent claims appeal to Supreme Court
Grandmother killed by state troopers in barrage of bullets after pursuit
An Obamacare Chart to Make You Cry…Balanced by Obamacare Cartoons to Make You Laugh
San Francisco bacon restaurant forced to close over smell
Dozens Of Homeland Security Employees On Terrorist Watch List
Open a Business in Chile in One Day, Over the Internet, for Free