“Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. The attack is more serious than the Thunderstrike proof-of-concept exploit late last year. While both exploits give attackers the same persistent and low-level control of a Mac, the new attack doesn’t require even brief physical access. That means attackers half-way around the world may remotely exploit it.”
Related posts:
Christian Bishops Kidnapped by US-Allied Syria Insurgents
NSA conducts mass surveillance of the US internet to find cyberattacks
Bitcoin Foundation On Capitol Hill, Day Two: Legislators
Oregon election worker fired for altering ballots to Republican straight ticket
LAPD Detains Photographer For 'Interfering' With Police From 90 Feet Away
America's Allies Feed Christians to the Dogs
Overcharge: 29 States Mandate High-Cost “Green” Power Generation
Land Rover of Redwood City, CA Sells First Land Rover for Bitcoin
Federal cybersecurity official going to jail on child porn charges
Food Stamp Nation: 20% of U.S. Households
U.S. Gov. Gets $2.6 Billion In Credit Suisse 'Money Laundering' Case
Secret Military Training Blurs Line Between Police and Soldiers
China's Record Yield Curve Inversion "Spells Disaster"
ACLU Seeks GPS Spying Documents From FBI
19-Year-Old Commits Suicide After Sheriff Posts Bullying Facebook Message