This article in
InfoWorld points to a particularly disturbing
article and accompanying
FAQ: The code, published over the weekend by researchers Adrian Pastor and Petko Petkov, exploits features in two technologies: The UPnP (Universal Plug and Play) protocol, which is used by many operating systems to make it easier for them to work with devices on
(
Read more... )