The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    ESET Discovers the first-ever UEFI rootkit cyberattack

    Discussion in 'Security and Anti-Virus Software' started by Spartan@HIDevolution, Dec 27, 2018.

  1. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,604
    Messages:
    23,561
    Likes Received:
    36,864
    Trophy Points:
    931
  2. xLima

    xLima Notebook Evangelist

    Reputations:
    132
    Messages:
    567
    Likes Received:
    280
    Trophy Points:
    76
    Last edited: Dec 27, 2018
    Dr. AMK likes this.
  3. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,604
    Messages:
    23,561
    Likes Received:
    36,864
    Trophy Points:
    931
    Thank for notifying me. I fixed the link and repped j00.
     
    Dr. AMK likes this.
  4. pete962

    pete962 Notebook Evangelist

    Reputations:
    126
    Messages:
    500
    Likes Received:
    223
    Trophy Points:
    56
    I always believed UEFI was designed to lockout user from it's computer , more than anything else. And I remember old BIOS had 100% foolproof security feature on my ancient desktop: except for small area for user data/settings, you could not flash, write to, or change BIOS until you manually short 2 pins to enable higher voltage necessary for writing operations. So unless the BIOS you were trying to flash was infected, there was no possible way to infect it without physical access to the computer. With UEFI it's just a matter of effort to find it's security holes and I'm sure there is more than one.