On 9/3/2011 6:10 PM, FromTheRafters wrote:
> "G. Morgan"<G_Morgan@easy.com> wrote in message
> news:bpa567htcc7gjh397mqavi9op949v96270@Osama-is-dead.net...
>> Dustin wrote:
>>
>>> possibilities if the
>>> lojack was tricked into thinking the worst by a malware file that
>>> detected it's presence and took advantage.
>>
>> A new attack vector, suggest you?
>>
>> That would be a nasty one.
>
> More a payload than an attack vector. Like the old cryptovirology
> angle, with a twist. You want your data back, pay me. Upon payment
> I *might* just tell you how - and it involves LoJack and you getting a
> root key of some sort from them - nothing to do with me at all, as it
> wasn't *my* key being used.
>
>
Would you put lojack on your laptop?
--
Jenn
(posting from Thunderbird)


Reply With Quote