MacBooks Get Hacked Within 60 Seconds
August 4, 2006 12:46 PM
comment(s) - last by
Security experts say poor driver design leaves doors wide open
Two security researchers from Black Hat this week revealed a method in which
a MacBook can be broken into and taken control of
. In fact, the intrusion method is at such a low level that even firewalls and anti-virus applications can't help. Based on flaws in wireless network driver design, Apple's line of MacBooks -- and MacBook Pros -- allows an attacker to remotely bypass the security of the laptop and the operating system.
Jon Ellch and David Maynor from Black Hat say that drivers for Apple's notebooks are developed not in house, but outside using contracted development companies. Ellch says that often times, these development people are under so much pressure from higher management to get working drivers so that companies can rush our products to market. Under circumstances like this, drivers for devices such as wireless network processors enter "the wild" in an untested state.
However, Mayner said that "we're not picking specifically on Macs here, but if you watch those 'Get a Mac' commercials enough, it eventually makes you want to stab one of those users in the eye with a lit cigarette or something." Mayner cites that many of Apple's commercials claim that Macs don't suffer from the same security vulnerabilities that PCs do but in fact, they do.
The team at Black Hat demonstrated that they could circumvent the Wi-Fi security and OS level security in a MacBook and within just 60 seconds, were able to take complete control of the machine. Black Hat demonstrated the technique through a pre-recorded video to prevent anyone from intercepting the wireless network traffic to deconstruct the attack and release it elsewhere. Black Hat said that it has been in contact with both Apple and Microsoft, because the vulnerability exists on both sides.
This article is over a month old, voting and posting comments is disabled
8/6/2006 5:19:42 PM
No, the Mac is like an impenetrable fortress against the malevolence being seiged upon the Windows users of the world. The Mac is completly and utterly incapable of receiving viruses, spyware, or any form of malware whatsoever. Also, it is so well designed and built that no hacker can penetrate it's balmy bellweather no matter what they attempt to, even stabbing it with the rubbery eraser end of a sharpened pencil will not cause it to ooze any sort of Mac goo. In short, this article is actually an attack by a spyware infected Windows computer on the dailytech site.
8/6/2006 8:08:07 PM
But, you have to admit, those Mac commercials are sooo pathetic you just have to laugh. The sad part comes when you realize just how many uninformed people out there are buying into that load of excrement. And yes, not even Superman could penetrate a Mac. Must be the kryptonite core they have, because they are truly otherwordly.
“Then they pop up and say ‘Hello, surprise! Give us your money or we will shut you down!' Screw them. Seriously, screw them. You can quote me on that.” -- Newegg Chief Legal Officer Lee Cheng referencing patent trolls
IBM Workers Strike Over Terms of Deal That Will Have Them Working for Lenovo
March 6, 2014, 9:29 AM
Google Picking Up Artificial Intelligence Company "DeepMind" for $400 Million
January 27, 2014, 9:25 AM
Quick Note: Qualcomm Grabs up Palm, IPAQ, and Bitfone Patent Portfolio from HP
January 24, 2014, 9:18 AM
Verizon Buys Intel Media OnCue Cloud TV assets
January 21, 2014, 10:26 AM
Google's First Asian Data Centers Now Operational
December 11, 2013, 8:50 AM
IBM to Offer Watson Supercomputer as Cloud Development Platform
November 14, 2013, 12:00 PM
Most Popular Articles
Mt. Gox Bitcoin CEO Can't Stifle Grin as he Bows in Apology for Bankruptcy
February 28, 2014, 5:00 PM
Report: Microsoft Considering Offering Free “Windows 8.1 with Bing”
February 28, 2014, 10:21 AM
Facebook Kills Popular Messenger App for PCs
March 1, 2014, 4:01 PM
Two More Microsoft Executives Leaving the Company
March 3, 2014, 4:38 PM
USAF Moves Forward With Long Range Bomber Program Despite Budget Crunch
March 4, 2014, 9:44 AM
Latest Blog Posts
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
Is The Period Becoming an Expression of Anger?
Nov 26, 2013, 2:02 PM
NSA and Congress -- You Will Never Kill the Constitution, It's an Idea
Nov 10, 2013, 2:00 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information