Ars Technica reports:
Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.
The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects Macs shipped prior to the middle of 2014 that are allowed to go into sleep mode. He found a way to reflash a Mac's BIOS using functionality contained in userland, which is the part of an operating system where installed applications and drivers are executed. By exploiting vulnerabilities such as those regularly found in Safari and other Web browsers, attackers can install malicious firmware that survives hard drive reformatting and reinstallation of the operating system.
[Editor's Comment: The Ars Technica headline has been changed on their site to remove the word 'remote'. They note that "the hack involves use of a local exploit."]
(Score: 2) by Freeman on Tuesday June 02 2015, @08:34PM
I think you missed a certain story about sourceforge titled "SourceForge Using Mirrored Projects and Including Adware" https://soylentnews.org/comments.pl?sid=7666&threshold=0&commentsort=0&mode=improvedthreaded&pid=189164 [soylentnews.org]. I'm pretty much done with anything sourceforge related now. It's kind of sad actually.
Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"