Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment: Regardless who Norad partners with. (Score 1) 58

by Holi (#48667845) Attached to: The History of the NORAD/Microsoft and Google Santa Trackers

Regardless who Norad partners with, I will use them. Why you ask? That's easy, they have the radar. I am pretty sure Google is just making stuff up as I don't think they have the radar facilities that the US and Canada have. So when I want to reliably track that red suited bastard, I'll ask the guys who actually know.

This year I got some new Starstreaks to replace my FIM-92j's, I'm pretty sure I'll shoot him down this time.

+ - Thunderbolt rootkit vector

Submitted by Holi
Holi (250190) writes "Attackers can infect MacBook computers with highly persistent boot rootkits by connecting malicious devices to them over the Thunderbolt interface.

The attack, dubbed Thunderstrike, installs malicious code in a MacBook’s boot ROM (read-only memory), which is stored in a chip on the motherboard. It was devised by a security researcher named Trammell Hudson based on a two-year old vulnerability and will be demonstrated next week at the 31st Chaos Communication Congress in Hamburg.

More at PCWorld"

The first time, it's a KLUDGE! The second, a trick. Later, it's a well-established technique! -- Mike Broido, Intermetrics

Working...