Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Lojack hijack called Lojax
- This topic has 0 replies, 1 voice, and was last updated 2 years, 6 months ago by .
Russian hacker group fancy bear has found a way to break into the security software “Lojack”. A type of software put in place years ago that tracks your computer if it gets stolen or lost. It is put in the firmware of the computer so it can not be destroyed by reinstalling a new OS or swapping hard drives. The hack malware/rootkit inserted into the “Lojack” software makes it hard to detect and harder to get rid of. It essentially allows the hacker to do anything with your computer and track your location if wanted. The only way to get rid of it is to flash the firmware on your computer, which most people would not know how to do which makes this a very sophisticated attack.
You must be logged in to reply to this topic.