Memory cards are the most commonly used , the SD Card it has a security hole that could endanger the user . More recently , two programmers explain the surprising fact that in the event the Chaos Communication Congress ( 30C3 ) .
Andrew Huang and Sean Cross said in his blog that someone could run malicious software (malicious ) in memory by itself .
This could occur because the memory card has a small computer called a microcontroller which is used to view the details of the data stored .
By exploiting these loopholes , someone could intercept the data that is being transferred from one storage to another storage . They are then able to examine and modify the data.
Huang and Cross said that the attack could also be used to copy data clandestinely , modify sensitive data such as passwords , or perform any undue execution file .
It is not only threatening type of SD memory card , but also other flash -based storage such as SSDs are now used instead of mechanical hard disk in a PC , or storage controller embedded multimedia card ( eMMC controller ) in a smartphone .
As reported by Cnet , on Monday ( 30/12/2013 ) , the two programmers find the gap theory by reverse - engineering the controller chip .
They learn how to accept and run the microcontroller firmware , and then learn that the command runs in the chip .
No comments:
Post a Comment