General discussion

Locked

Adventures in Security

By tolzak ·
Tags: Off Topic
blog root

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

Windows OneCare Live Cost Revealed

by tolzak In reply to Adventures in Security

Late last week I wrote about the beta version of OneCare Live.? At that time, Microsoft hadn’t released?when it would role out the production release or how much it would cost.? Today, Microsoft announced that it would provide OneCare for $49.95 a year starting this June.? The annual price includes using the desktop security service [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=43">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Related Discussions

Related Forums