Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
The attack, which is fully presented in a new Watchfire research paper released today can allow a malicious individual to achieve not only remote, persistent access to sensitive data, but in some cases full system control as well.
The full paper can be found here (1).
A demonstration of the attack flow can be found here(2).