- They can’t be removed by conventional means (antivirus, formatting).
- They can circumvent other types of security (passwords, encrypted file systems).
- They can be injected during manufacturing.
Want more Interesting Articles to your Inbox every Morning? We'll keep you up to date with Latest News and In-Depth coverage of Current and Future Trends in Information technology. Subscribe & WIN a Free Pass to NULLCON 2016
No Thanks, I Don't want to Learn anything New