“It fills the airwaves with probes that request connections to nearby computing devices. When the specially devised requests reach a device using the BCM43xx family of Wi-Fi chipsets, the attack rewrites the firmware that controls the chip. The compromised chip then sends the same malicious packets to other vulnerable devices, setting off a potential chain reaction.”
Related posts:
Swiss Gold Initiative's Paypal Donation Account Frozen
Why Mt. Gox, the World’s First Bitcoin Exchange, is Dying
3-D-printed gun available for download after firing first shots
Which States Are Most Drunk on Wine Taxes?
Tax disclosure report reveals 'minnows' paid penalties of as much as 129x tax owed
The New Boogieman: Military Grade Weapons
Bill Bonner: This Credit Event Could Crush the Stock Market
For Terrorist Fearmongers, It's Always the Scariest Time Ever
Europe's Political Response To Voters May Increase Violence
Litecoin, Dogecoin ATMs Launching This Week in Mexico
State Dept cites D-Day as example of ‘strong relationship’ with Germany
Cops knew suburban mom no terrorist, shot and killed her anyway
Bitcoin fuels new car sales at Overland Park Jeep
Now, in Second Place Is …
Cities’ Strategy in Health Insurance for Retirees: “Dump Them Into ObamaCare!”