“Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. The attack is more serious than the Thunderstrike proof-of-concept exploit late last year. While both exploits give attackers the same persistent and low-level control of a Mac, the new attack doesn’t require even brief physical access. That means attackers half-way around the world may remotely exploit it.”
Related posts:
The drug revolution that no one can stop
New iOS flaw makes devices susceptible to covert keylogging
From Petrodollar To Petrogold: The US Is Now Trying To Cut Off Iran's Access To Gold
Connecticut Gun Owners Stand In Long Lines to Register Firearms
Living on Bitcoin is a real challenge for newlywed couple
Microsoft DMCA Notice ‘Mistakenly’ Targets BBC, Techcrunch, Wikipedia and U.S. Govt
Psychiatrists Baffled By Mental Disorder Which Only Afflicts Leaders Who Refuse To Bow To US Interes...
Greek Island to Trial Gold-Backed Digital Currency Alternative to the Euro
$21 million later, London police stop waiting out Assange at embassy
Students Underwater
Trump Makes First Step To Revoke Iran Nuclear Deal
Kerry’s Morally, Linguistically, and Historically Obscene Case for War in Syria
S.F. SmartCar-Tippers Rage Against the Machine
Nigel Farage: We Are Now Entering The Terrifying End Game
Oregon Prosecutors Still Wasting Resources on Medical Cannabis