Not true.  From Cnet.

The successful attack on the second and final day of the contest required a
conference organizer to surf to a malicious Web site using Safari on the
MacBook--a type of attack familiar to Windows users.

Nothing was downloaded to the machine and run, indeed this exact attack is
probably the most common attack on windows...and apparently not hard to
exploit on a mac.

Full article:
http://www.news.com/2100-7349_3-6178131.html?part=rss&tag=2547-1_3-0-5&subj=news

On 10/19/07, John DeCarlo <[EMAIL PROTECTED]> wrote:
>
>
> 3.  The incident you cite was one where a reward was given to anyone who
> could exploit a Mac - no one could for the $10,000 offered.  So they then
> changed the rules so that you could have a user download anything they
> wanted to the machine and then run it.  Under those new rules, someone
> exploited QuickTime.  I agree with you that any system can be exploited if
> you have a user download something and then execute it with sufficient
> privileges.
>
>


************************************************************************
* ==> QUICK LIST-COMMAND REFERENCE - Put the following commands in  <==
* ==> the body of an email & send 'em to: [EMAIL PROTECTED] <==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]
************************************************************************
* List archive at www.mail-archive.com/[email protected]/
* RSS at www.mail-archive.com/[email protected]/maillist.xml
* Messages bearing the header "X-No-Archive: yes" will not be archived
************************************************************************

Reply via email to