Unless you were at Black Hat on Feb. 28, you probably woke up safe in the assumption that if a rootkit hit your system, reimaging would remove it. You probably also thought that the best way to search a PC's volatile memory, or RAM, was by grabbing it with a PCI card or a FireWire bus.
You were wrong.
Thursday, March 01, 2007
Black Hat Demonstrations Shatter Hardware Hacking Myths
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment