“It fills the airwaves with probes that request connections to nearby computing devices. When the specially devised requests reach a device using the BCM43xx family of Wi-Fi chipsets, the attack rewrites the firmware that controls the chip. The compromised chip then sends the same malicious packets to other vulnerable devices, setting off a potential chain reaction.”
Related posts:
The biggest Bitcoin win in gambling history
Destroying the Right to Be Left Alone
The Drone War Doctrine We Still Know Nothing About
Fox News analyst: ‘Very high probability’ Iraq hid WMDs in Syria
The NSA Is Hiring! And Following A Pittsburgh Car Dealership On Its Twitter Account?
Evangelization vs. Copyright
100 Outgunned Mexican Women Join Self-Defense League
Ben Swann: Is Bitcoin Real Capitalism?
How Mobile Devices Are Changing Africa
Cops Raid Gamer Live On Twitch After Fake SWAT Call
Ron Paul and Barney Frank tell Obama: Respect state marijuana laws
China's Gold Fever Rises, Showing No Signs Of Abating
Good Timing! Financial Times Affirms the Canadian Real-Estate Bust
America’s Roads Have Been Turned Into A Revenue Generating Surveillance Grid
“Emergency” Measures May Be Written Into the French Constitution