Network cards can be used to allow an attacker to run malicious code

Discussion in 'other security issues & news' started by MrBrian, Apr 11, 2010.

Thread Status:
Not open for further replies.
  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    http://blogs.paretologic.com/malwar...-the-french-pull-off-a-nice-proof-of-concept/
     
  2. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    http://www.ssi.gouv.fr/site_article185.html
    Can You Trust The Network Card PDF

    Awesome MrBrian.
    Who needs horror movies like Zombieland when someone is rooting your hardware!

    Also:
    http://www.ssi.gouv.fr/site_article185.html

    ACPI, design principles and Concerns

    ACPI and routine treatment of SMI: limits to the trusted computing?
     
  3. wat0114

    wat0114 Guest

    http://www.ssi.gouv.fr/site_article185.html

     
  4. Dogbiscuit

    Dogbiscuit Guest

    This has never been shown before?
     
Loading...
Thread Status:
Not open for further replies.