It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Apply all of the browser, application and OS patches you want, your machine still can be completely and silently compromised at the lowest level--without the use of any vulnerability.
"It was very easy. We can put the code wherever we want," said Ortega. "We're not using a vulnerability in any way. I'm not sure if you understand the impact of this. We can reinfect the BIOS every time it reboots."
, Heasman showed a completely working method for loading the malware on to a PCI card by using the flashable ROM on the device. He also had a way to bypass the Windows NT kernel and create fake stack pointers.
Originally posted by Solomons
Cant you just clear your cmos?
[edit on 25-3-2009 by Solomons]
Originally posted by JohnHolmes
I always thought my cmos was safe cause it's password protected. It doesn't look that way anymore.
...you need either root privileges or physical access to the machine in question, which limits the scope
...Heasman showed a completely working method for loading the malware on to a PCI card by using the flashable ROM on the device.
Originally posted by prjct
As a Mac user I fail to see why so many people still use windowz.......the article doesn't say anything about Macintosh/Apple unless someone is using VMWare....I think??
The sure solution to this, as well as any other pc/windowz related viruses, bugs, spyware, etc., etc....is...
say it with me...
Buy and use a Mac!