Not true. From Cnet. The successful attack on the second and final day of the contest required a conference organizer to surf to a malicious Web site using Safari on the MacBook--a type of attack familiar to Windows users.
Nothing was downloaded to the machine and run, indeed this exact attack is probably the most common attack on windows...and apparently not hard to exploit on a mac. Full article: http://www.news.com/2100-7349_3-6178131.html?part=rss&tag=2547-1_3-0-5&subj=news On 10/19/07, John DeCarlo <[EMAIL PROTECTED]> wrote: > > > 3. The incident you cite was one where a reward was given to anyone who > could exploit a Mac - no one could for the $10,000 offered. So they then > changed the rules so that you could have a user download anything they > wanted to the machine and then run it. Under those new rules, someone > exploited QuickTime. I agree with you that any system can be exploited if > you have a user download something and then execute it with sufficient > privileges. > > ************************************************************************ * ==> QUICK LIST-COMMAND REFERENCE - Put the following commands in <== * ==> the body of an email & send 'em to: [EMAIL PROTECTED] <== * Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name * Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST * Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L * New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress * Need more help? Send mail to: [EMAIL PROTECTED] ************************************************************************ * List archive at www.mail-archive.com/[email protected]/ * RSS at www.mail-archive.com/[email protected]/maillist.xml * Messages bearing the header "X-No-Archive: yes" will not be archived ************************************************************************
