Tag: bios

Computers remain exposed to boot-up vulnerability 
By Joseph Menn | Aug 4, 2014 | Comment Now 
Manufacturers failing to heed security warnings.
 
Anti-theft tech allows remote hijacking of millions of computers 
By Juha Saarinen | Feb 13, 2014 | Comment Now 
BIOS-based threat unknown to many users.
 
Global security nightmare for PCs narrowly averted 
By Juha Saarinen | Apr 8, 2013 | Comment Now 
UEFI BIOS source code, signing keys leaked online.
 
Global security nightmare for PCs narrowly averted 
By Juha Saarinen | Apr 7, 2013 | Comment Now 
UEFI BIOS source code, signing keys leaked online.
 
Windows 8 product key change causes headache 
By Juha Saarinen | Nov 27, 2012 | Comment Now 
Embedded in BIOS, not displayed on a sticker.
 
Highly persistent backdoor infects BIOS, peripherals  
By Darren Pauli | Aug 3, 2012 | Comment Now 
Malware hides from forensic analysis.
 
BIOS rootkit attacks China 
By Dan Kaplan | Sep 16, 2011 | Comment Now 
But attack scope is limited.
 
NSW seeks to build unhackable netbook network 
By Brett Winterford | Sep 23, 2009 | Comment Now 
The world's "most hostile computing environment".
 
New BIOS attack renders antivirus useless 
By Iain Thomson | Mar 27, 2009 | Comment Now 
A new form of attack that installs a rootkit directly onto a computer’s BIOS system would render antivirus software useless researchers have warned.
 
New BIOS attack renders antivirus useless 
By Iain Thomson | Mar 27, 2009 | Comment Now 
A new form of attack that installs a rootkit directly onto a computer’s BIOS system would render antivirus software useless researchers have warned.
 
Microsoft closes in on Vista BIOS crack 
By Tom Sanders | Apr 13, 2007 | Comment Now 
Emulating a special OEM BIOS marker offers way to bypass Vista's anti-piracy.
 
Microsoft closes in on Vista BIOS crack 
By Tom Sanders | Apr 12, 2007 | Comment Now 
Emulating a special OEM BIOS marker offers way to bypass Vista's anti-piracy.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 337

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 141

Vote