Well this one is really more of a trojan but an integrated one.
Decent Exploit of ACER machines anyway.
This could be problematic.
I am also not that certain of their method of informing ACER of the Vuln (or even if it was approached that way). I doubt ACER meant it the way it can be used.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment