Get the latest tech news

Widely used DNA sequencer still doesn’t enforce Secure Boot


A firmware-dwelling bootkit in the iSeq 100 could be a key win for threat actors.

In an email, Eclypsium CTO Alex Bazhaniuk wrote: "To be fair, with an OS that does not get the most recent security updates, there are plenty of risks and threats, not to mention how each IT organization manages their own assets on their network." Many medical devices are built on off-the-shelf servers and older configurations which may not have Secure Boot enabled or are running outdated firmware, as in many cases it is very hard or impossible to update." Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords.

Get the Android app

Or read this on ArsTechnica

Read more on:

Photo of Secure Boot

Secure Boot

Photo of DNA sequencer

DNA sequencer

Related news:

News photo

Old BitLocker vulnerability exploited to bypass encryption on updated Windows 11 | Secure Boot? TPM? Full-disk encryption? All useless against resourceful hackers

News photo

Microsoft security update breaks dual-boot Linux systems using Secure Boot | "Something has gone seriously wrong" with the August Patch Tuesday update

News photo

Secure Boot rendered useless, over 200 PC models from different makers are affected | Making matters worse, many vendors have been recycling keys across product lines