Myopic, IMO.No, it should be in this forum, as the hack was performed on a MacBook Air. And since there were many Macs available for hacking at the PWN contest and the MBA was the only one that was hacked, it rightly belongs here.
to get this right: somebody has to steal my mac, connect it via cable to a mac and then they get to control my mac?
how is this a security risk for the average user? i mean as soon as i get physical access to a mac i can simply read the data on the hd anyway. and if the data was encrypted (as it should be) then there is no harm (to the data). so what's the point? what am i missing aside of $10 000 and a MBA![]()
Didn't sound like he needed physical access at all, other than to have the "user" surf on over to his website.Miller, best known as one of the researchers who first hacked Apple's iPhone last year, didn't take much time. Within 2 minutes, he directed the contest's organizers to visit a Web site that contained his exploit code, which then allowed him to seize control of the computer, as about 20 onlookers cheered him on.
No, it should be in this forum, as the hack was performed on a MacBook Air. And since there were many Macs available for hacking at the PWN contest and the MBA was the only one that was hacked, it rightly belongs here.
can i just get a solid, accurate definition of ''PWNED"
i see it constantly....used in many different contexts. just wondering what was out there for a definition.
thanks.
Meh, Urban Dictionary's 124 definitions are a lot more um .. colorful?? than Wikipedia's.Urban Dictionary is your friendhttp://www.urbandictionary.com/define.php?term=PWNED
Doh! aristobat beat me too it![]()
Maybe Jobs will get his finger out of his ass and realize that Mac OS is just as vulnerable as any other operating system. Believing anything else is sheer ignorance.![]()
No, it should be in this forum, as the hack was performed on a MacBook Air. And since there were many Macs available for hacking at the PWN contest and the MBA was the only one that was hacked, it rightly belongs here.
Didn't sound like he needed physical access at all, other than to have the "user" surf on over to his website.
to get this right: somebody has to steal my mac, connect it via cable to a mac and then they get to control my mac?
how is this a security risk for the average user? i mean as soon as i get physical access to a mac i can simply read the data on the hd anyway. and if the data was encrypted (as it should be) then there is no harm (to the data). so what's the point? what am i missing aside of $10 000 and a MBA![]()
And here I (after switching from Windows a year ago) was just starting to believe that my Mac is secure without having virus protection.![]()
The rules of the contest are here, and the Mac lost fair and square. The most damning thing is that the other teams kept attacking the Vista and Ubuntu machines the rest of the day (from which they could still win the cash prize, as it's one prize per machine, not one total), but both survived the entire day.
No need to invent alternative theories to defend Apple's honor here. Safari f*cked up and there is no shame in admitting that. It isn't the first time, and probably won't be the last time either.
Try googling 'firefox malicious code'.GOOOOOO Fire Fox!
This is FUD.
Try googling 'firefox malicious code'.
IIRC, all browsers (at one point or another) have had versions that allowed for these types of exploits.