Oh please. Where is Windows XP? Why is each Windows version separate? Where is Android with that massive MMS flaw that 950 million devices are vulnerable to? Most of which the carriers and vendors will NOT update.
...
Is this really a threat? Is there anything common users should do?
Um Windows XP still has quite a bit of market share. Businesses are still using it.Yeah, dude! Where is Mac OS 9? What about Mac OS 7?!
There's nothing incorrect about this grammar. It's just technically ambiguous.
There's no verb in the sentence anymore if you add the comma, so the second one is actually incorrect. If you aren't trying to qualify it as a sentence, the second phrase is unambiguous, but the first one is still grammatically correct; there's no grammatical rule against forming sentences with ambiguous meanings. I'm American-born, and I'm not going to get into which version of English is the "proper" one.Ermm, yes there is:
"First Firmware Worm Able to Infect Macs Created by Researchers"
Should read:
"First Firmware Worm Able to Infect Macs, Created by Researchers"
The comma COMPLETELY changes the context.
Source: I am English, born in England, living in England - the SOURCE of ENGLISH.
Ermm, yes there is:
"First Firmware Worm Able to Infect Macs Created by Researchers"
Should read:
"First Firmware Worm Able to Infect Macs, Created by Researchers"
The comma COMPLETELY changes the context.
Source: I am English, born in England, living in England - the SOURCE of ENGLISH.
Anyone know if the 2007 27 inch iMac is susceptible to this? It doesn't have a Thunderbolt connection, but the article says this can affect Macs via a shady website.
The Thunderstrike 2 vulnerability won't affect you at all. The DYLD bug will affect you only if you are running a version of Yosemite. That bug is being fixed in 10.10.5, although there's currently no release date for that yet. You would have to download something and run it to become infected, although you wouldn't be required to enter a password as that is what the vulnerability (privilege escalation bug) does. No one can currently be infected by just visiting a website.
Please pardon my ignorance here...but I have never understood why people make these viruses. Like, what's their motive, and what do the get from it?
Anyone care to explain?
Ok thanks, though if you don't mind me asking - how do you know the 2009 iMac won't be affected at all? I'm not worried about the Day Zero bug.
And no website can currently infect due to the malware merely being proof of concept at this point in time?
Your machine needs a Thunderbolt interface to be vulnerable to the Thunderstrike 2 bug. Thunderbolt wasn't released until 2011. USB can't be used as in infection vector as it doesn't have an option rom.
The DYLD zero day exploit can't be used to infect directly without you downloading and running an app. This is because there isn't currently an exploit that it can be combined with to allow a drive by attack to succeed. As long as you stick to installing software from vendors you trust you and everyone else should be fine. That's not to say it doesn't need patching and it will be in 10.10.5
If you are using OS X 10.10.4 you are susceptible to the 0-day privilege-escalation bug that this firmware worm is using to infect the system without asking for a password:
echo 'echo "$(whoami) ALL=(ALL) NOPASSWD:ALL" >&3'| DYLD_PRINT_TO_FILE=/etc/sudoers newgrp
http://arstechnica.com/security/201...-x-comes-under-active-exploit-to-hijack-macs/
Do you not think that the antivirus/antimalware companies employ people to find holes?
It's this that's clashing with what you're telling me -
" Thunderstrike 2, unlike the first demonstration of Thunderstrike, is able to infect a Mac remotely through a malicious website or email. "
Or is TS2 not even out in the wild yet so there's really nothing to worry about?
It doesn't clash with anything. TS2 is able to infect a Mac though malicious executables, just like what we did when we upgrade Mac firmware. The attackers could leverage DYLD exploits in their codes to skip the permission granting step, but before that, these malicious executables shall be launched first.
A malicious executable won't launch itself automatically simply by browsing a website or opening an attachment. You'll still need to manually disable Gateway protection, launch that mimic application, and click "OK" when system warning message pops up.
The article simply says "visiting or opening a malicious website or e-mail can infect your machine" - And said nothing about having to have the user do something in order for the firmware to get infected/overwritten.
Thus the confusion. So what you're saying is I would have to manually do something to allow the firmware attack to occur and overwrite my firmware?
Heh, yeah, I was actually conscious that I was using a colloquialism while omplaining that I couldn't understand the dirty foreigner, but I left it in cos it made me smile too!Seeing "bloke" and "foreign accent" in the same sentence tickled me. You know because I'm an American and think the world revolves around the US.
Obviously, your point and terminology was completely accurate, it just make me smile for some reason. ;-)