Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ShadowAce

“Safari was also part of the spoils, making this the third consecutive year contestant Charlie Miller has compromised the Apple browser. Miller, 36, who is principal security analyst at Independent Security Evaluators, said he came to this year’s contest armed with close to 20 working attacks that in virtually every case allow him to seize control of the Mac running the program.”

AH HAHAHAHAHAHA!!!!! Where are all of the devout Mac users who say that it is invulnerable????? 20 “holes”?????


21 posted on 03/25/2010 12:28:59 PM PDT by El Gran Salseron
[ Post Reply | Private Reply | To 1 | View Replies ]


To: El Gran Salseron
Even one of the winners say the same thing we read on these PC vs. Mac threads:

The genius of a contest like Pwn2Own is that it exposes the insecurity of software that rarely gets exploited by criminals. Plenty of Linux and Mac fans cite the absence of real-world exploits on those platforms as proof positive that they are inherently safer than the prevailing Microsoft operating system. It's an argument that carried little weight in Vancouver.

"The problem Microsoft has is they have a big market share, said Vreugdenhil, the hacker who attacked IE. "I use Opera, but that's basically because it has a tiny market share and as far as I know, nobody is really interested in creating a drive-by download for opera. The web at the moment is pretty scary, actually."

24 posted on 03/25/2010 1:01:47 PM PDT by Ol' Dan Tucker (People should not be afraid of the government. Governement should be afraid of the people)
[ Post Reply | Private Reply | To 21 | View Replies ]

To: El Gran Salseron
AH HAHAHAHAHAHA!!!!! Where are all of the devout Mac users who say that it is invulnerable????? 20 “holes”?????

I don't know. Perhaps you could find us an example of one of those posts by a "devout Mac users who say that it is invulnerable".

No software is invulnerable. Some (OSX/Linux) is more resistant to such attacks than others (MS-Windows).

I did not see indications that any of the hacks displayed here were able to escalate the privilages of the attackers. That makes a big difference as to whether the attack is useful to criminals and those who run botnets.  being able to dump some of your personal information is bad enough. Having your computer turn into a zombie is something entirely different.

25 posted on 03/25/2010 1:23:00 PM PDT by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 21 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson