![]() With that, the hacker can gain the ability to write not only to the stolen laptop but to the fortified network it was configured to connect to. Research published last week shows that the answer is a resounding "yes." Not only that, but a hacker who has done her homework needs a surprisingly short stretch of time alone with the machine to carry out the attack. ![]() Can the attacker use it to hack your network? ![]() ![]() And let’s say an attacker manages to intercept the machine. And let’s say it comes preconfigured to use all the latest, best security practices, including full-disk encryption using a trusted platform module, password-protected BIOS settings, UEFI SecureBoot, and virtually all other recommendations from the National Security Agency and NIST for locking down federal computer systems. Let’s say you’re a large company that has just shipped an employee a brand-new replacement laptop.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |