UEFI
Watch a Hacker Install a Firmware Backdoor on a Laptop in Less Than 5 Minutes
This demo shows that “evil maid attacks,” hacks where an attacker has physical access to a target computer, are not as complicated as you may think.
WikiLeaks’ New Dump Shows How The CIA Allegedly Hacked Macs and iPhones Almost a Decade Ago
The new documents show how the CIA was ahead of the curve in attacking Apple computers.
Advertisement
Advertisement
Advertisement