A Mac OS X attack that leaves no trace

Discussion in 'macOS' started by Habakuk, Jan 25, 2009.

  1. Habakuk macrumors 6502a

    Jul 10, 2007
    Vienna Austria Europe

  2. Theophany macrumors 6502a


    Nov 16, 2008
    NW London.
  3. synagence macrumors 6502a

    Jul 23, 2008
    Hopefully he's presented his findings to apple 1st though so they can mitigate this threat
  4. Riemann Zeta macrumors 6502a

    Feb 12, 2008
    Wouldn't this cease to be viable the second after one rebooted their machine? If not, it must be one hell of an attack, somehow getting around the volatility of RAM.
  5. ppc750fx macrumors 65816

    Aug 20, 2008
    Holy crap -- you mean he's found a way to run code in RAM only?!? Wow! That's... uh... pretty normal actually. In fact, that's what most exploits for most platforms do. Pretty much any buffer overrun can be used to do the exact same thing as this "revolutionary", "new" technique.

    This reeks of the sort of sensationalism and half-assed reporting that we've seen in recent years. Kinda like whenever Intego notices a dip in their sales and decides to write a puff piece on the latest trojan, this article is just junk meant to scare you and make you take notice of a person/company with an axe to grind. Ignore it, and stop doing their PR for them.

Share This Page