https://ift.tt/eA8V8J
The tool attacks a device’s UEFI firmware—which makes it especially hard to detect and destroy. When a hacking organization’s secret tools are stolen and dumped online for anyone to pick up and repurpose, the consequences can roil the globe. Now one new discovery shows how long those effects can persist. Five years after the notorious …
Source: https://ift.tt/3lfhtTb
Không có nhận xét nào:
Đăng nhận xét