I'm going to start this post by saying something that a lot of people will find surprising. There are a lot of things that I like about UEFI firmware and the UEFI boot process. I think it is an ...
A vulnerability in trusted system recovery programs could allow privileged attackers to inject malware directly into the system startup process in Unified Extensible Firmware Interface (UEFI) devices.
We're in the home stretch now. In the first post of this series I looked at the general characteristics of Linux installations on systems with UEFI firmware - specifically how the disk is partitioned, ...
First off, a little context. I'm a 30+ year Mac user and I just bought my first PC in decades. I'm no stranger to Windows and Linux, but haven't used them as a desktop OS for about 15 years. My ...
With the increasing prevalence of open-source implementations and the expansion of personal computing device usage to include mobile and non-PC devices as well as traditional desktops and laptops, ...
These days, bootstrapping a computer is a pretty straight forward process, at least as far as the user is concerned. But in ...
The vulnerabilities were introduced when Lenovo inadvertently included an early development driver in the commercial versions of their software. Lenovo has released fixes for high-severity bios ...
Acer has fixed a high-severity vulnerability affecting multiple laptop models that could enable local attackers to deactivate UEFI Secure Boot on targeted systems. The Secure Boot security feature ...
A recently surfaced Linux bootkit, which nests in the UEFI (Unified Extensible Firmware Interface) and is intended to bypass its security measures, is apparently a project by South Korean scientists.
UEFI secure boot was designed to block malicious code from sneaking into your PC's BIOS boot-up process. However, a newly discovered ransomware dubbed HybridPetya somehow found a way to circumvent ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback