
Understanding Windows 11 new security requirements with David Weston
Hanselminutes with Scott Hanselman
00:00
Do You Want to Do a Stealth Attack?
There's some interesting there's been leaks in the past from ill government attributed to governmental agencies, or they use specialized hardware to do d m a attack surreptitiously. Call that the evil cleaner attack oneless sneaks into your hotel, plugs a d m a device in, injects an inplant, leaves. Those are all things that are real. Can be done with less than a hundred dollars worth of hardware, through tool kits like t c i, leach, et cetera. There's also a form of attack, and we've seen the increasing lately, which is injecting into early boot a f i modils, or modifying them aster m b r boot
Play episode from 14:05
Transcript


