(no title)
justifier | 7 years ago
can you point to any resources on a few things:
(o) examples of these kinds of malware, either code or writeups
(i) ways of detecting these kinds of malware
(ii) ways of removing these kinds of malware
(iii) ways of preventing these kinds of malware from getting installed
efp|7 years ago
http://spritesmods.com/?art=hddhack&page=5
https://blog.invisiblethings.org/papers/2015/x86_harmful.pdf
justifier|7 years ago
the first link is about modifying a system's c compiler which the op's tails live usb is infact a solution to
the second is about altering firmware on harddrives, which is an engrossing writeup, thank you, but does fall short of suggesting ways to identify and remedy such an invasion
your third one is about intel's ME which i figured i'd see someone link to
unfortunately, the really interesting listed elements in my original post are the preventative and resolutive elements