
“Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. The attack is more serious than the Thunderstrike proof-of-concept exploit late last year. While both exploits give attackers the same persistent and low-level control of a Mac, the new attack doesn’t require even brief physical access. That means attackers half-way around the world may remotely exploit it.”
Related posts:
Paul Rosenberg on RT: Online Surveillance in the US
The New Trend in Gold
Jim Rogers Rand Radio Interview 24 Sept 2013
The Insanity Of Bitcoin, Explained
New Beer Lawsuit Could Spell Trouble For Keystone XL Pipeline
BitPay Surpasses 10,000 Bitcoin Merchant Transactions, Zero Cases of Payment Fraud
Trump Tried to Bulldoze an Elderly Widow's Home to Build a Limo Parking Lot
Texas Troopers forcibly arrest 72-year-old woman during Wendy Davis filibuster
World’s Largest Bitcoin Exchange Out $10 Million
German Police Abduct Four Homeschooled Kids With Battering Ram
Freeloaders
Federal cybersecurity official going to jail on child porn charges
'Portals' Opens New Channel Between U.S. and Iran
The CFR: The Go-To Organization for Government Tools Ready to Cash In
Privacy services companies stand up against Big Brother