Researchers unveil persistent BIOS attack methods

Monday, March 23rd, 2009

Apply all of the browser, application and OS patches you want, your machine still can be completely and silently compromised at the lowest level--without the use of any vulnerability. That was the rather sobering message delivered by a pair of security researchers from Core Security Technologies in a talk at the ...

Attacking SMM Memory via Intel CPU Cache Poisoning

Saturday, March 21st, 2009

As promised, the paper and the proof of concept code has just been posted on the ITL website here. A quote from the paper: In this paper we have described practical exploitation of the CPU cache poisoning in order to read or write into (otherwise protected) SMRAM memory. We have implemented two ...

Researchers Make Wormy Twitter Attack

Friday, March 20th, 2009

Computer security researchers have devised a new Twitter attack that they say could spread virally, much like a worm on the microblogging service. The attack, posted online Thursday by researchers at Secure Science is an innocuous proof of concept that forces users to send out a predetermined twitter message, but it ...

Add Wireshark to the PortableApps Suite

Thursday, March 19th, 2009

I just saw that Wireshark has a version available for download to add it directly to your PortableApps Suite.  This will allow you to carry a working copy of Wireshark around with you on a USB stick with all of your other portable applications. First, grab the portable version of Wireshark ...

Rootkit code to exploit major Intel chip

Wednesday, March 18th, 2009

This is the scariest, stealthiest, and most dangerous rootkit I’ve seen come around since the legendary Blue Pill! No, I’m not just trying to sensationalize this or spread fear, uncertainty and doubt. This is serious and represents a massive new security threat for us all. Security Researchers Joanna Rutkowska and Loic ...