Apple hires two hackers who created an undetectable virus.
Hacking BIOS Chips Isn't Just the NSA's Domain Anymore | WIRED But researchers Xeno Kovah and Corey Kallenberg presented a proof-of-concept attack today at the CanSecWest conference in Vancouver, showing how they could remotely infect the BIOS of multiple Can the bios on a PC be updated or modified if there is a The article refers to researchers Xeno Kovah and Corey Kallenberg, who went on to found the company LegbaCore. I believe they then went to Apple (and are no longer publishing). I spoke with someone who is responsible for BIOS security for a proces Thunderstrike 2: Proof-of-concept worm could infect Macs
Dailydave: Understanding BIOS & SMM
Aug 04, 2015 Apple Hired the Hackers Who Created the First Mac Firmware Feb 03, 2016 CERIAS : Rootkits - Purdue University
Xeno Kovah BIOS Chronomancy: Fixing the Core Root of Trust for Measurement | 2 | Introduction ! Who we are: – Trusted Computing researchers at The MITRE Corporation
Aug 26, 2018 · Xeno Kovah Co-founder, LegbaCore, LLC Corey Kallenberg Co-Founder, LegbaCore, LLC. The number of vulnerabilities in firmware disclosed as affecting Wintel PC vendors has been rising over the past few years. Although several attacks have been presented against Mac firmware, unlike their PC counterparts, all of them required physical presence to perform. Xeno Kovah: macOS 10.13 EFI firmware integrity check (twitter.com) 88 points by transpute 8 months ago Xeno, please don't get yourself fired from Apple for leaks Jul 12, 2018 · “Looks like Apple released MacBookPros w/ T2 chip today. These support SecureBoot, and have enough under the hood security changes that it looks like it's time to update my personal laptop” Xeno Kovah. Usage Attribution-Share Alike 3.0 Topics training, education, multi-day-class, multi-day-training, classes, computer security class, computer, computers Xeno Kovah BIOS Chronomancy: Fixing the Core Root of Trust for Measurement | 2 | Introduction ! Who we are: – Trusted Computing researchers at The MITRE Corporation Why do we say “We do digital voodoo”? Because we focus on security at the deepest darkest levels of computer systems. Specifically the areas where attackers can persist indefinitely without fear of detection, because you have zero visibility at that level.