“Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. The attack is more serious than the Thunderstrike proof-of-concept exploit late last year. While both exploits give attackers the same persistent and low-level control of a Mac, the new attack doesn’t require even brief physical access. That means attackers half-way around the world may remotely exploit it.”
(Visited 25 times, 1 visits today)
Related posts:
EU governments get cold feet on financial transactions tax
Russian rocket engine export ban could halt US space program
Fight the Fed from the Inside
U.S. Army To Be Used Against “Insurrectionist” Tea Party?
Ukraine's Largest Bank Limits Cash Withdrawals To $100 Daily
Fraudulent Certificate for Google Domains Found After Mistake by Turkish CA
Apple’s Fingerprint ID May Mean You Can’t ‘Take the Fifth’
An NSA-Proof Twitter, Built With Code From Bitcoin and BitTorrent
UN puts rich nations on the hook for trillions in climate liabilities
The Obamacare Problem Isn’t Messaging, It’s Statism
China Bans Margin Calls; Limits Pension Funds To Buying Stocks Only
Vermont Marijuana Decriminalization Law Goes Into Effect
Here's Why The Winklevoss Twins LOVE Bitcoin
EU backs plans by member states to arm Kurds in Iraq
Will ABC really tell us what happened at Waco in 1993?