v1_0
Chief Petty Officer
- Joined
- Aug 27, 2007
- Messages
- 575
http://tech.yahoo.com/news/ap/20090730/ap_on_hi_te/us_tec_hacker_conference_infected_pc
Ok, in summary: since 2005 it looks like the BIOS manufacturers (Pheonix: 60% market share in laptops, was named) have put a 'rootkit' in the bios of laptops, in order for a the company, Absolute, to be able to track stolen laptops. The phrase "lojack for laptops" is going around...
Anyway, turns out the adage "if people make it, people can break it" is true here too: it is possible for the rootkit to be subverted by someone if they have access to your laptop (say via a virus, or malware).
Now the really big point is that this code 'lives' in your BIOS - which means that you could wipe, and totally reformat, your hard-drive - and not touch it. It would reinstall itself when your install windows... It's designed to be very resilient..
Up to this point, there was some safety "security through obscurity" because the existence of the rootkit wasn't well known. Obviously, this is changing...
Ok, in summary: since 2005 it looks like the BIOS manufacturers (Pheonix: 60% market share in laptops, was named) have put a 'rootkit' in the bios of laptops, in order for a the company, Absolute, to be able to track stolen laptops. The phrase "lojack for laptops" is going around...
Anyway, turns out the adage "if people make it, people can break it" is true here too: it is possible for the rootkit to be subverted by someone if they have access to your laptop (say via a virus, or malware).
Now the really big point is that this code 'lives' in your BIOS - which means that you could wipe, and totally reformat, your hard-drive - and not touch it. It would reinstall itself when your install windows... It's designed to be very resilient..
Up to this point, there was some safety "security through obscurity" because the existence of the rootkit wasn't well known. Obviously, this is changing...