<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d26473280\x26blogName\x3dHackers+News\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLACK\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttp://hackers-news.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://hackers-news.blogspot.com/\x26vt\x3d113306571398039483', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Hackers News

Keeping Knowledge Free

Five new vulnerabilities in Mac OS X

A researcher has discovered a new round of holes in Mac OS X, further proof that hackers are starting to look beyond the Windows landscape for exploit opportunities. The flaws, discovered by Tom Ferris of the Security-Protocols blog, can lead to DoS attacks, said monitoring service Secunia, which rated the vulnerabilities highly critical on Friday. Some of the errors can be exploited when the Safari browser processes malformed HTML tags or GIF images on a malicious website or when Safari decompresses malformed ZIP archives in the Finder. Ferris, who included proof-of-concept exploit code in his posting, said he notified Apple about the flaws early this year and has been told they "will be fixed in the next security release." As users await patches, Secunia recommends they avoid untrusted websites and do not open ZIP archives or images originating from unknown sources.

read more
« Home | Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »

5:01 PM

I'm no expert, but how can the mere existence of these vulnerabilities 'prove' that hackers are targetting the Mac OS?

Did they create the vulnerabilities? No.

Would these vulnerabilities exist if there were no such thing as hackers? Yes.

I know that Mac OS X has its security issues, but just by having a vulnerability, does not prove that a hacker is targetting us.    



» Post a Comment