Monday, March 23, 2009
Researchers unveil persistent BIOS attack methods
Apply all of the browser, application and OS patches you want, your machine still can be completely and silently compromised at the lowest level--without the use of any vulnerability.
We can put the code wherever we want. Future goal is virtualized Rootkit.
mODEM, etHERNET, VGA and hard disk hijacking.
Injector is a 100 line Pyton script !.
We can put the code wherever we want. Future goal is virtualized Rootkit.
mODEM, etHERNET, VGA and hard disk hijacking.
Injector is a 100 line Pyton script !.