http://www.eweek.com/c/a/Mobile-and-Wireless/Apple-Laptop-Hack-Disables-Batteries-Researcher-to-Show-How-at-Black-Hat-452759/
[...]
Miller examined MacBooks, MacBook Pros and MacBook Airs, and found that many of 
the batteries on those units had a 4-byte default password hard-coded on the  microchips inside and a second password to give full access to the hardware  firmware. With the two default passwords in hand, the perpetrator could rewrite 
the chips' firmware. Miller discovered the passwords after analyzing a software 
update from 2009 from Apple that addressed an issue with MacBook batteries. He  was able to reverse-engineer the chip's firmware and modify the power  information it sent to the operating system. He was also able to rewrite the  firmware.
The ability to access and send instructions to the chip could be used by other  attackers for malicious purposes, such as preloading malware on to the chip,  according to Miller. Once the attacker figures out a way to go from the battery 
to the operating system, battery-based malware could be used to infect the  computer and steal data, take control of the laptop or cause it to crash  whenever it was in operation, Miller said.
When faced with this kind of malware, IT administrators and users will wipe the 
hard drive, reinstall software and reinstall the BIOS firmware, but not think  to check the battery's firmware, according to Miller. "Every time it would  reattack and screw you over," Miller said, noting the only way to eradicate or  detect it would be by removing the battery.
"These batteries just aren't designed with the idea that people will mess with  them," Miller said.
[...]
--- Thunderbird 2.0.0.24 (Windows/20100228)
 * Origin: Fidonet Via Newsreader - 
http://www.easternstar.info (1:123/789.0)