Computrace backdoor exposes millions of PCs
Security researchers have discovered millions of PCs have Computrace software enabled. This software is enabled in the BIOS by default. It allows for a Windows PC to be taken over remotely. Computrace does not enforce encryption when it communicates and it does not verify the identity of the remote server from which it receives commands. Most users are not even aware that this software is installed and enabled in their BIOS.
Nearly every PC has an anti-theft product called Computrace embedded in its BIOS PCI Optional ROM or its unified extensible firmware interface (UEFI). Computrace (aka. Lojack for Laptops) is a legitimate, trusted application developed by Absolute Software. However, it often runs without user-consent, persistently activates itself at system boot, and can be exploited to perform various attacks and to take complete control of an affected machine.
Nearly every PC has an anti-theft product called Computrace embedded in its BIOS PCI Optional ROM or its unified extensible firmware interface (UEFI). Computrace (aka. Lojack for Laptops) is a legitimate, trusted application developed by Absolute Software. However, it often runs without user-consent, persistently activates itself at system boot, and can be exploited to perform various attacks and to take complete control of an affected machine.
(1) the Computrace thing was only capable of "hacking" your Windows install; wipe and install, say Ubuntu, and Computrace can't do anything.
(2) the BIOS usually offered three settings, forgive me that I'm fuzzy on the exact same wording, Inactive (meaning it hacks you and phones home but pretends it doesn't), Enabled (hacks you, phones home, if you've paid you can track it), Disabled (doesn't hack you, but doesn't un-hack you if you already are). The last two are permanent choices, once you pick either of those you can never undo it. Flashing the BIOS has no effect.
Anybody know if these are still true?