On Thu, Jun 7, 2012 at 5:43 AM, Andrei POPESCU <andreimpope...@gmail.com> wrote:
> On Mi, 06 iun 12, 13:04:50, Kelly Clowers wrote:
>>
>> I sincerely doubt it. Although I guess it depends on what you mean by
>> "via the network". Worms that infect like SQL Slammer are relatively
>> rare, AFAIK most malware get in via drive-by downloads, or intentional
>> installation of programs that are infected. Those are user issues and
>> browser issues (though local OS exploits may be used after the
>> browser security is bypassed). Though these get delivered by the
>> network, it isn't the same as vulnerabilities in, say, the TCP/IP
>> stack, or a vulnerable OS daemon/service.
>
> But still, those attacks wouldn't be prevented by Secure Boot, so Nate's
> argument (Secure Boot won't improve Windows security) still stands.

Did everyone miss this link [1] that was posted by MG in his blog post?!

Simply because viruses/malware/etc have been introduced historically
through the network doesn't mean that the firmware isn't a target now
or won't be in the future.

That Microsoft's leveraging a (potential) solution to this problem to
make our lives difficult isn't surprising...

1. 
http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAOdo=Sww2+H=rve5w7fohlaeh9x6c73mv30fst3khrvhb1h...@mail.gmail.com

Reply via email to