Thursday, March 01, 2007

Black Hat Demonstrations Shatter Hardware Hacking Myths

Unless you were at Black Hat on Feb. 28, you probably woke up safe in the assumption that if a rootkit hit your system, reimaging would remove it. You probably also thought that the best way to search a PC's volatile memory, or RAM, was by grabbing it with a PCI card or a FireWire bus.

You were wrong.

No comments:

Post a Comment