These memories store that component's firmware and are usually rewritable all it takes is knowing the right address to it, and manufacturers usually provide tools to upgrade the firmware, so all the attacker to do is substitute his own code (there is almost never any cryptography).įor example, there is a known (and fairly simple) exploit for Apple keyboards, found by K. Malware can be stored in one of the many rewritable memories that lurk in just about every component of a modern computer. Even there, you need to be careful if you restore any data that may have been compromised. Reinstalling the operating system means a disk wipe at most. It is definitely possible for a slightly sophisticated attacker to leave malware outside the direct reach of the operating system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |