Ars Technica reports:
Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.
The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. He found a way to reflash a Mac's BIOS using functionality contained in userland, which is the part of an operating system where installed applications and drivers are executed. By exploiting vulnerabilities such as those regularly found in Safari and other Web browsers, attackers can install malicious firmware that survives hard drive reformatting and reinstallation of the operating system.
[Editor's Comment: The Ars Technica headline has been changed on their site to remove the word 'remote'. They note that "the hack involves use of a local exploit."]
(Score: 1, Flamebait) by Tork on Tuesday June 02 2015, @08:10PM
🏳️🌈 Proud Ally 🏳️🌈
(Score: 3, Disagree) by ikanreed on Tuesday June 02 2015, @08:30PM
Well, I can see why it got modded flamebait now.
A harmless joke turned you into a raving lunatic.
(Score: 2, Touché) by Tork on Tuesday June 02 2015, @08:44PM
🏳️🌈 Proud Ally 🏳️🌈