|
Authored by: Anonymous on Wednesday, September 19 2012 @ 03:09 PM EDT |
Did I leave anyone else out?
Maybe Linux will be just as protected against this vulnerability as other
Windows malware?
[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Wednesday, September 19 2012 @ 03:35 PM EDT |
From the article:
"Our research attempts to show the industry
that the new UEFI platform is still as insecure as the old BIOS technology, it's
still vulnerable to the old attacks if the SecureBoot technology is not turned
on by default," Giuliani told El Reg. "Writing a bootkit couldn't be an easier
task for virus writers with the UEFI framework available, much easier than
before when they needed to code in pure assembly.
"The
UEFI platform will soon become the new field of war between malware writers and
the security industry unless SecureBoot is used to ensure that only digitally
signed UEFI bootloaders can be executed at the system
bootup."
Bolding mind.
The line: you'll still be hit by
rootkits if you don't enable UEFI right from the start!
Congrats to El
Reg for raising the important point:
Giuliani also said that -
although it's desirable from a security perspective - enabling SecureBoot by
default effectively limits user choice.
RAS[ Reply to This | Parent | # ]
|
|
|
|
|