The pinacle of “Whoops!”
Posted in Randomosity...
What happens when people who design computer security processes and best practices are exploited in a simple manner that any 12 year old with a freon can and an erector set can make use of?
http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf
For everyone who encrypted your hard drives…it just goes to prove, if someone wants what you have…they can get it.
-T