
“Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. The attack is more serious than the Thunderstrike proof-of-concept exploit late last year. While both exploits give attackers the same persistent and low-level control of a Mac, the new attack doesn’t require even brief physical access. That means attackers half-way around the world may remotely exploit it.”
Related posts:
Lunlun Zou Guzheng Studio: First Hong Kong Business to Accept Bitcoin
An Ex-Cop Talks About Police Shootings
Microsoft remotely deleted Tor-based botnet from 2 Million Systems
The NSA's Perversion of Privacy: The Most Outrageous Breaches
Blogging about Cops Is Not a Crime – Even If You're on Probation
Flying RoboCop is a “riot control” octocopter with guns and lasers
Sen. Lindsey Graham: Support immigration bill since with it "we've practically militarized the borde...
Google Glass-wearing moviegoer interrogated by Homeland Security
IRS Demands: “Turn Over Those Names!”
The Retention of Wealth
Obamacare Provision: "Forced" Home Inspections
Societé General Strategist: Yellen's Dithering Fed Is Destined for Infamy
Volkswagen Ends Microbus Production Due To New Safety Regulations
Puerto Ricans push for U.S. statehood in referendum vote
Popular dolls transmit kids’ conversations to US military contractor