From Vincent Zimmer’s twitter feed, Dell is taking action regarding firmware boot security in some of their new devices:
Exerpting from the Network World story by Agam Shah:
[…] As a hacked UEFI is hard to to fix, Dell’s new security tool offers an alternative method. At boot, the tool verifies a UEFI snapshot with an identical copy in the cloud and can notify a user or system administrator of any inconsistency. A copy of the UEFI can then be reloaded on the computer to fix the problem. That’s just a start. The company is working on a feature in which hacked UEFI can “auto-remediate” itself, said David Konetski, executive director in the Client Solutions Office of the CTO at Dell. He did not share when that feature would be in PCs. […]
Ted Reed of Facebook has a different opinion on Dell’s tactics:
This is today’s big news on UEFI, bumping the last few days of Apple/LegbaCore:
http://www.businesswire.com/news/home/20160204005352/en/Dell-Secure-PCs-Industry-Secure-BIOS-Verification
http://www.networkworld.com/article/3029615/dell-is-stepping-in-to-protect-the-boot-layer-of-pcs-tablets.html
http://www.anandtech.com/show/10010/dell-to-add-offhost-bios-verification-to-endpoint-security-suite-enterprise
http://www.computerworld.com/article/3029981/security/dell-will-protect-the-boot-layer-of-pcs-tablets.html
http://www.infoworld.com/article/3029646/security/dell-is-stepping-in-to-protect-the-boot-layer-of-pcs-tablets.html
http://www.pcworld.com/article/3029620/security/dell-is-stepping-in-to-protect-the-boot-layer-of-pcs-tablets.html
