Malicious Hardware Hacking May Be the Next Frontier 146
An anonymous reader writes "It's a given that hackers will target software, and that's enough for many people to worry about. But now there's the possibility that hackers would hide malicious code in the hardware itself. A hardware hack could be an annoyance, by stopping a mobile phone from functioning. Or it could be more dangerous, if it damages the way a critical system operates. Villasenor says there are several types of attacks. Broadly they would fall into two categories: one is when a block stops a chip from functioning, while the other involves shipping data out."
Re:We Certainly May! (Score:3, Funny)
Then again, July not.
Re:Uhm? (Score:5, Funny)
I think somebody accidentally the headline.
For some reason... (Score:3, Funny)
Re:lolwut? (Score:5, Funny)
Article Headline Hackers May the Final Frontier (Score:3, Funny)
Ahem... (Score:4, Funny)
May. The Next Frontier. These are the failures of the Slashdot Editors. Their ongoing mission: To explore strange new URLs, to seek out new memes and new trending topics. To boldly fail where no man has failed before!
James May? (Score:1, Funny)
Hackors (Score:4, Funny)
Re:lolwut? (Score:5, Funny)
Re:Uhm? (Score:5, Funny)
In Soviet Russia, you!
Re:Why the poor choice of word? (Score:3, Funny)
Oh, and also -
A desktop tower is also now called the "CPU" or "hard drive"
RAM capacity and hard drive storage capacity can now be used interchangeably
Internet Explorer and Firefox applications are now called "the internets"
Transferring any data over any medium is called "downloading"
Any mp3 player, regardless of the brand, is called an "iPod"
Please make a note of this for future reference.