you mean this exploit is going to make you buy MORE Apple hardware? Apple will fix this in a New York minute! 
Imagine that a value pack of tinfoil is on sale for only .99, but your credit card could be infected by malicious code in the card reader. What do you do?
Of all the alleged Mac "hacks" that have surfaced over the years, this is the only one that has seemed to be a legitimate concern to me. The other hacks usually required direct access to your computer or installing some shady torrent software after putting in an admin password. This thing can be remotely installed from a website and can't be wiped. Sure, don't visit a shady website you say. But if a web server is compromised in some other way and this hack is installed, you could get it from nearly anywhere. This is bad.
Agreed. However the way I see it, this is a double-edged sword. On the one hand these 'researchers' help Apple and the Mac community-at-large by pointing out vulnerabilities that can then be addressed, but they also highlight these weak spots to those malicious hackers that are ready to pounce during that limited window of opportunity, before patches are in place.it's crazy that someone has this kind of time on their hands. I'd love to hire them to work on my latest App design but they are busy hacking away at the mac.
Apple for obvious reasons has seemed to be taking their time to respond to these various exploits.
Actually, Apple has already been infected by a worm.
It happened many years ago. It lay dormant, and bided its time, waiting for the right moment to begin its mission to turn Apple rotten. It's name is Tim.
From various report, technology articles, and from this one. Many of them says mac OS X is somewhat more vulnerable than windows, because apple release fixes slowly.Source?
I hear what you're saying, they have a responsibility to act on this asap.What obvious reasons? - I think it's pertinent to fix this ASAP. Any lallygagging around is pretty inexcusable. Apple responding to these threats as quick as possible can only lead to good things, or am I missing something?
OS X won the prestigious "Most Vulnerable Operating System" trophy for 2014 with iOS not far behind.
http://www.gfi.com/blog/most-vulnerable-operating-systems-and-applications-in-2014/
http://www.neowin.net/news/mac-os-x-and-ios-top-2014-security-vulnerability-list
http://www.networkworld.com/article...rating-systems-in-2014-ie-wins-worst-app.html
http://www.zdnet.com/article/mac-os-x-is-the-most-vulnerable-os-claims-security-firm/
Makes us look stupid for all the times we've told everyone else how robust & secure OS X is, sorry I meant was.
Access to system folders does require a password.Just sandbox all browsers and implement a thorough scan of anything downloading. Sandboxing the user folders would also help. Access to system folders should require a password.
There's nothing incorrect about this grammar. It's just technically ambiguous."First Firmware Worm Able to Infect Macs Created by Researchers"
So these researchers created Macs? Poor grammar, you need to go back to school, Macrumors.
Maybe, maybe not. A guy walks up to a convenience charging station in the gate area at ATL. His MacBook (with one, universal port) is pre-infected (intentionally?) with this malware. It transfers to the Thunderbolt/USB-C at the charging station. Now every subsequent user of that charging station will be infected. The same could happen at libraries, A/V presentation situations ("oh you forgot your cable, here borrow this one..."), etc.I think the keyword here is "firmware". Just like the original Thunderstrike, it involves plugging in a rogue Thunderbolt cable or accessory. That's the freaking attack vector. So... if you don't plug anything that you don't trust, then you can't be compromised. Sure if you are willy-nilly plugging in an infected thunderbolt cable to multiple computers, it can infect them, yada yada... but the issue here is it has to start with infected hardware which a) doesn't exist in the wild b) would replicate very slowly.
We all know how rubbish everyone is when it comes to security. XDErr, no it won't. We all know how rubbish Apple is when it comes to security so if you think El Capitan will make your Mac bulletproof then you need to get some help.
Also all the Flash and Java vulnerabilities, but they're usually discovered before too many have fallen victim, so I never worry.Of all the alleged Mac "hacks" that have surfaced over the years, this is the only one that has seemed to be a legitimate concern to me. The other hacks usually required direct access to your computer or installing some shady torrent software after putting in an admin password. This thing can be remotely installed from a website and can't be wiped. Sure, don't visit a shady website you say. But if a web server is compromised in some other way and this hack is installed, you could get it from nearly anywhere. This is bad.
Correct me if I'm wrong, but this doesn't necessarily sound like a worm to me.
They didn't describe how this works really - they said that malicious code can be delivered via email or a website... And then what? It still needs to be run, does it not? It won't just automatically run itself, will it?
That means it's a Trojan, not a worm, right? The only precaution a user needs to take is not running code that they shouldn't trust, and by default since Mountain Lion, you can't run unsigned code because of Gatekeeper, right?
There is also the fact that Windows versions are listed separately, but Mac OS versions are not. Adding together all of Windows exploits gets you to 248 exploits, which is more than Apples.
lol hey at least they are being honest.At least with Windows 10 you know MS is snooping on everything by default. The whole OS is a trojan.
What if every Mac is already infected with malware.Actually, Apple has already been infected by a worm.
It happened many years ago. It lay dormant, and bided its time, waiting for the right moment to begin its mission to turn Apple rotten. It's name is Tim.
The question is: Why does this guy wear nail varnish?