|
Authored by: Anonymous on Saturday, June 09 2012 @ 07:52 PM EDT |
Well yes. Socially engineered malware is usually fastest, easiest, and most
effective. But I imagine there be certain engineering, security, defence, and
medical industries wherein computer security is taken seriously with
appropriate precautions, and where interweb access is also necessary. You know,
the folks who enforce boot password security even before the machine sees the
OS. Today's bleeding edge bad stuff -- Stuxnet and Flame -- will be tomorrow's
old hat. Having been thus forewarned, what would we think of Microsoft tomorrow
if they didn't take this stuff seriously today?
Yeah yeah, I
know...
Here's a distantly related link on
Address Space Layout Randomization, another blindingly obvious
security technique that would be pretty meaningless without a secure boot as
well.
[ Reply to This | Parent | # ]
|
|
|
|
|