Firmware Articles

A look at the leaked CIA malware attacks on Apple software

  • 26/03/2017 at 23:32 by It's a Gadget Staff
  • News

Smartphone SpyWikileaks has once more released a series of documents that claim to show malware the CIA used to spy on owners of Apple products. And they are pretty hardcore.

The CIA’s Target: Macs

We have seen many examples of how the CIA, among other organizations, have used exploits to get backdoor access into people’s phones, computers, and other devices. But this is a new set of revelations, specifically targeting Mac computers using directly targeted malware installed by CIA operatives.

+Continue Reading

China may be mining data from your smartphone through ‘backdoor’, experts warn

  • 15/11/2016 at 23:59 by It's a Gadget Staff
  • News

Android LogoA new vulnerability has been discovered in hundreds of thousands of Android devices, which experts say is sending data back to China for unknown reasons.

The software was created by a Chinese company called Shanghai Adups Technology Company, and according to a representative for the tech developer, it has been installed on at least 700,000 devices worldwide. Security experts at the Virginia-based Kryptowire found the software running in the background when searching for more traditional vulnerabilities.

+Continue Reading

The vulnerability of firmware, and what it means for all of us

  • 26/02/2015 at 23:01 by It's a Gadget Staff
  • News

NSA Spy ViewFirmware hacking is in the news a lot this week. Snowden’s Reddit AMA talked about spy agencies and their use of firmware hacking to gain backdoor entry. Gemalto confirmed reports of NSA and GCHQ attempts to break into their systems and steal encryption keys back in 2010 – 2011. Most alarmingly, Kaspersky Lab found a piece of malicious coding in their software last week connected to the now infamous Stuxnet. It makes it clear that firmware is very vulnerable to attack, and that it could have some wide reaching implications.

Firmware hacking tools have become increasingly sophisticated over the years. Each new release and attack seems to be smoother, more effective, harder to find. While in hacks like the Gemalto attempt to steal encryption keys were only acceptable in accessing the first level, and not anywhere near the keys themselves, there have been years of evolution since.

+Continue Reading