I'm going to start this post by saying something that a lot of people will find surprising. There are a lot of things that I like about UEFI firmware and the UEFI boot process. I think it is an ...
First off, a little context. I'm a 30+ year Mac user and I just bought my first PC in decades. I'm no stranger to Windows and Linux, but haven't used them as a desktop OS for about 15 years. My ...
UEFI firmware flaws in certain ASRock, ASUS, GIGABYTE, and MSI motherboards allow early-boot DMA attacks before OS security ...
Multiple security vulnerabilities collectively named LogoFAIL affect image-parsing components in the UEFI code from various vendors. Researchers warn that they could be exploited to hijack the ...
That's good advice, and I'm happy to follow it. If all we do is sit around and moan about dual-booting Linux on UEFI systems, it really is likely to discourage some people from trying it, and the ...
Motherboards from several major vendors are affected by a vulnerability that can allow a threat actor to conduct early-boot ...
The ICWG chair of the UEFI Forum debunks and clarifies a number of myths surrounding UEFI firmware—a foundational layer in the software stack. This file type includes high-resolution graphics and ...
Linux Australia is fit to be tied over recent reports that Microsoft is requiring Windows 8 certified machines to support UEFI secure booting, a situation that could most likely hamper or block Linux ...
A recently surfaced Linux bootkit, which nests in the UEFI (Unified Extensible Firmware Interface) and is intended to bypass its security measures, is apparently a project by South Korean scientists.
Event ID 1799 is the event logged when a boot manager signed by the Windows UEFI CA 2023 certificate (the latest and most secure) runs on startup. This means all the security measures are in place, ...