Network cards can be used to allow an attacker to run malicious code

Discussion in 'other security issues & news' started by MrBrian, Apr 11, 2010.

Thread Status:
Not open for further replies.
  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    http://blogs.paretologic.com/malwar...-the-french-pull-off-a-nice-proof-of-concept/
     
  2. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    http://www.ssi.gouv.fr/site_article185.html
    Can You Trust The Network Card PDF

    Awesome MrBrian.
    Who needs horror movies like Zombieland when someone is rooting your hardware!

    Also:
    http://www.ssi.gouv.fr/site_article185.html

    ACPI, design principles and Concerns

    ACPI and routine treatment of SMI: limits to the trusted computing?
     
  3. wat0114

    wat0114 Guest

    http://www.ssi.gouv.fr/site_article185.html

     
  4. Dogbiscuit

    Dogbiscuit Guest

    This has never been shown before?
     
Loading...
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.