The pinacle of “Whoops!”

What happens when people who design computer security processes and best practices are exploited in a simple manner that any 12 year old with a freon can and an erector set can make use of?

http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf

For everyone who encrypted your hard drives…it just goes to prove, if someone wants what you have…they can get it.

-T