For example, an emerging area of vulnerability is the code in device firmware that runs at startup to prepare the OS launch. Hackers look for ways to inject malware into this code beneath the operating system, which by default never required security and integrity checks designed into its sequence. As a result, the OS will trust this code even when it contains a nefarious malware payload.