
“Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. The attack is more serious than the Thunderstrike proof-of-concept exploit late last year. While both exploits give attackers the same persistent and low-level control of a Mac, the new attack doesn’t require even brief physical access. That means attackers half-way around the world may remotely exploit it.”
Related posts:
Here's a New Way to Bet on China: Open a Renminbi Bank Account [2011]
Peter Buffett's Very Public Takedown of His Father, Warren
NYPD cracks down on cyclists on weekend after deadly crash
Did Goldman Sachs Overstep in Criminally Charging Its Ex-Programmer?
State Regulators Force Vermont's Only Bitcoin ATM Offline
Cops to Congress: We need logs of Americans' text messages
Apple, GE, and others could soon sell their products in Iran
Boston Marathon Witness Interview: Police Told Us Bomb Drill Was 'Training Exercise'
"Most people are yet to understand how disruptive [Bitcoin] is."
Second Passports from the Caribbean
France Taxes America: The Robin Hood Tax
“Snowden Effect” in Action: NSA Authority to Collect Bulk Phone Metadata Expires
Why I Joined Shield Mutual
Feds Raid Texas Meeting, Fingerprint All Attendees, Seize Phones
Blowback: How ISIS Was Created by the U.S. Invasion of Iraq