How many parts of an average laptop can be compromised? and how to confirm they are not?

The majority of virus/malware is stored and persists on the hard drive, Therefore by formatting the hard drive or re-installing the operating system, the virus is removed.
However, the average laptop also provides other means of infection … Continue reading How many parts of an average laptop can be compromised? and how to confirm they are not?

New Windows/Linux Firmware Attack

Interesting attack based on malicious pre-OS logo images:

LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years, if not decades, in Unified Extensible Firmware Interfaces responsible for booting modern devices that run Windows or Linux….

The vulnerabilities are the subject of a coordinated mass disclosure released Wednesday. The participating companies comprise nearly the entirety of the x64 and ARM CPU ecosystem, starting with UEFI suppliers AMI, Insyde, and Phoenix (sometimes still called IBVs or independent BIOS vendors); device manufacturers such as Lenovo, Dell, and HP; and the makers of the CPUs that go inside the devices, usually Intel, AMD or designers of ARM CPUs……

Continue reading New Windows/Linux Firmware Attack

Risk of spyware with proprietary firmware packages on Linux, even after removing them?

When I installed Debian 12 LXQt ISO with the graphical install, it installed many proprietary firmware packages that were not needed and without my consent.
Is it possible that proprietary firmware included in Debian default installation c… Continue reading Risk of spyware with proprietary firmware packages on Linux, even after removing them?

Quantum risk is real now: How to navigate the evolving data harvesting threat

In an era where data security is paramount, the recent revelations about firmware backdoors implanted by Chinese government-backed hackers serve as a stark reminder of the evolving threat landscape. BlackTech is infiltrating routers to gain undetectabl… Continue reading Quantum risk is real now: How to navigate the evolving data harvesting threat