Separate names with a comma.
Discussion in 'macOS' started by Habakuk, Jan 25, 2009.
Thank goodness he's on our side.
Hopefully he's presented his findings to apple 1st though so they can mitigate this threat
Wouldn't this cease to be viable the second after one rebooted their machine? If not, it must be one hell of an attack, somehow getting around the volatility of RAM.
Holy crap -- you mean he's found a way to run code in RAM only?!? Wow! That's... uh... pretty normal actually. In fact, that's what most exploits for most platforms do. Pretty much any buffer overrun can be used to do the exact same thing as this "revolutionary", "new" technique.
This reeks of the sort of sensationalism and half-assed reporting that we've seen in recent years. Kinda like whenever Intego notices a dip in their sales and decides to write a puff piece on the latest trojan, this article is just junk meant to scare you and make you take notice of a person/company with an axe to grind. Ignore it, and stop doing their PR for them.