
“It fills the airwaves with probes that request connections to nearby computing devices. When the specially devised requests reach a device using the BCM43xx family of Wi-Fi chipsets, the attack rewrites the firmware that controls the chip. The compromised chip then sends the same malicious packets to other vulnerable devices, setting off a potential chain reaction.”
Related posts:
Civilian drone deaths triple in Afghanistan, UN agency finds
The Evolution of the Marijuana Marketplace
Florida: Changing Car Color Does Not Justify Traffic Stop
The U.S. blacklist of Russian oligarchs: what is the real impact?
Gold Rush Fever Hits Nome, Alaska
Students DESTROY NSA Recruiters Over Illegal Spying and Lies
U.S. court grants Nigerian asylum-seeker the right to testify about his own torture
NSA Refuses To Release Secret Obama Directive On Cybersecurity
Smartworld - Identity Ecosystem
The FDA: A Pain From the Neck to the Big Toe
Georgia Must Block This Flawed Computer Crime Bill
No More Spills? New Technology Could Transform the Pipeline Sector
New "451" Error Message Would Tell Users When Governments Block Websites
Bloody Scenes from the Next Episode of Economic Crisis
Deutsche Bank Stock Crashes After Fed "Secretly" Put It On "Troubled" Watchlist