“Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. The attack is more serious than the Thunderstrike proof-of-concept exploit late last year. While both exploits give attackers the same persistent and low-level control of a Mac, the new attack doesn’t require even brief physical access. That means attackers half-way around the world may remotely exploit it.”
Related posts:
California, New York and DC look to ban 3D-printed guns
America’s PhDs on Food Stamps
One Man's Terrorist
Campus Gun Free Zone Did Not Stop a Dangerous Gunman….Guns Did
Fox News analyst: ‘Very high probability’ Iraq hid WMDs in Syria
Debt: Still Cheap, and Getting Looser
European Parliament votes to suspend US SWIFT data exchange
Trump Makes First Step To Revoke Iran Nuclear Deal
Bootleggers and Baptists on the Beach
The United Nations vs. the NSA
The Persecution of Rita Hutchens
The War on Asparagus
Did you know police have their own Bill of Rights?
Teen Killed by Taser, Cops Laugh & High-Five Each Other (Israel Hernandez) - Exclusive Interviews
US Defense Dept. analyzing Bitcoin as potential terrorism threat