Get the latest tech news
Widely used DNA sequencer still doesn’t enforce Secure Boot
A firmware-dwelling bootkit in the iSeq 100 could be a key win for threat actors.
In an email, Eclypsium CTO Alex Bazhaniuk wrote: "To be fair, with an OS that does not get the most recent security updates, there are plenty of risks and threats, not to mention how each IT organization manages their own assets on their network." Many medical devices are built on off-the-shelf servers and older configurations which may not have Secure Boot enabled or are running outdated firmware, as in many cases it is very hard or impossible to update." Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords.
Or read this on ArsTechnica