- Oct 26, 2005
- 801 (0.16/day)
Hackers use any means necessary to achieve their goal including hardware vulnerabilities and even pretending to be hot single girls (social engineering). I happen to know a start-up that was targeted by Silent Bob is Silent exploit. Sophisticated attacks are usually performed against high-value targets. There is no much to gain from targeting individuals. Hardware vulnerabilities are best used for privilege escalation. If its possible to seal a security hole, do it, better safe than sorry... the performance degradation is not a big deal.