Over 3,700 security professionals gathered in Las Vegas early this month to preview the latest threats and to see firsthand what new attacks and compromises are coming. Many features of commonly used protocols, when used in creative ways, can expose users and companies to significant vulnerabilities. A zero-day exploit was demonstrated via a video (this prevented hackers from sniffing the details of the actual attack) that showed a remote exploit and installation of a root-kit on a Macbook. WiFi driver flaws enable various computer systems to be remotely compromised even if their wireless adapter is not connected to a network.”]
Source: https://www.cuinfosecurity.com/black-hat-usa-2007-briefing-a-535

