RealNews

Researchers: Rootkits headed for BIOS

Insider attacks and industrial espionage could become more stealthy by hiding malicious code in the core system functions available in a motherboard’s flash memory, researchers said on Wednesday at the Black Hat Federal conference. A collection of functions for power management, known as the Advanced Configuration and Power Interface (ACPI), has its own high-level interpreted language that could be used to code a rootkit and store key attack functions in the Basic Input/Output System (BIOS) in flash memory, according to John Heasman, principal security consultant for U.K.-based Next-Generation Security Software. Full Story

OODA Analyst

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.