{"id":1386,"date":"2009-03-20T04:12:39","date_gmt":"2009-03-20T09:12:39","guid":{"rendered":"http:\/\/onthe8spot.com\/?p=1386"},"modified":"2009-03-20T04:12:39","modified_gmt":"2009-03-20T09:12:39","slug":"why-i-dont-use-safariitwire-mac-hacked-in-under-10-seconds-at-pwn2own","status":"publish","type":"post","link":"http:\/\/onthe8spot.com\/index.php\/2009\/03\/20\/why-i-dont-use-safariitwire-mac-hacked-in-under-10-seconds-at-pwn2own\/","title":{"rendered":"Why I Don&#039;t Use Safari::iTWire &#8211; Mac hacked in under 10 seconds at PWN2OWN"},"content":{"rendered":"<div class=\"zemanta-img\" style=\"margin: 1em; display: block;\">\n<div>\n<dl class=\"wp-caption alignright\" style=\"width: 212px;\">\n<dt class=\"wp-caption-dt\"><a href=\"http:\/\/en.wikipedia.org\/wiki\/Image:Apple_Safari.png\"><img loading=\"lazy\" decoding=\"async\" title=\"Safari\" src=\"http:\/\/upload.wikimedia.org\/wikipedia\/en\/thumb\/6\/61\/Apple_Safari.png\/202px-Apple_Safari.png\" alt=\"Safari\" width=\"202\" height=\"202\" \/><\/a><\/dt>\n<dd class=\"wp-caption-dd zemanta-img-attribution\" style=\"font-size: 0.8em;\">Image via <a href=\"http:\/\/en.wikipedia.org\/wiki\/Image:Apple_Safari.png\">Wikipedia<\/a><\/dd>\n<\/dl>\n<\/div>\n<\/div>\n<blockquote><p>from <a href=\"http:\/\/www.itwire.com\/content\/view\/23941\/53\/\">here<\/a>:<br \/>\n<a class=\"zem_slink\" title=\"Mac OS\" rel=\"wikipedia\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mac_OS\">Mac<\/a> hacked in under 10 seconds at PWN2OWN \tE-mail<br \/>\nby <span class=\"small\">by <a class=\"zem_slink\" title=\"Davey Winder\" rel=\"wikipedia\" href=\"http:\/\/en.wikipedia.org\/wiki\/Davey_Winder\">Davey Winder<\/a> <\/span><br \/>\n<span class=\"intro\">So just how secure is your <a class=\"zem_slink\" title=\"Apple\" rel=\"homepage\" href=\"http:\/\/www.apple.com\">Apple<\/a> computer now that Mac <a class=\"zem_slink\" title=\"Hacker (computer security)\" rel=\"wikipedia\" href=\"http:\/\/en.wikipedia.org\/wiki\/Hacker_%28computer_security%29\">hacker<\/a> supremo <a class=\"zem_slink\" title=\"Charlie Miller\" rel=\"wikipedia\" href=\"http:\/\/en.wikipedia.org\/wiki\/Charlie_Miller\">Charlie Miller<\/a> has broken into a <a class=\"zem_slink\" title=\"MacBook\" rel=\"wikipedia\" href=\"http:\/\/en.wikipedia.org\/wiki\/MacBook\">MacBook<\/a> in less than 10 seconds?<br \/>\n<\/span><br \/>\nThe annual <a class=\"zem_slink\" title=\"CanSecWest\" rel=\"homepage\" href=\"http:\/\/cansecwest.com\/\">CanSecWest<\/a> PWN2OWN competition is always guaranteed to grab a few headlines and spark off another <a class=\"zem_slink\" title=\"Ordnance Survey\" rel=\"homepage\" href=\"http:\/\/www.ordnancesurvey.co.uk\">OS<\/a> Wars flame. Last year <a class=\"zem_slink\" title=\"Security\" rel=\"wikipedia\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security\">security<\/a> researcher Charlie Miller managed to hack a Mac in a rather astonishing two minutes flat.<br \/>\nThis year he pulled off the same feat to win the contest, the MacBook he hacked and a US $5000 prize. Well the same feat but a lot quicker: how does Mac hacked in under 10 seconds grab you as a headline?<br \/>\nAlthough full extent of what the hack entailed remain a little sketchy, with Miller refusing to reveal the <a class=\"zem_slink\" title=\"Vulnerability\" rel=\"wikipedia\" href=\"http:\/\/en.wikipedia.org\/wiki\/Vulnerability\">vulnerability<\/a> details at this time, it is known that both the MacBook and the version of<br \/>\nThe reason for that lack of detail would appear to wrapped up in the fact that the cash prize also took the form of a payment from the competition sponsor,<br \/>\nObviously the whole cracked in 10 seconds thing is worrying, but just how worried should you be if you are a Mac or <a class=\"zem_slink\" title=\"Safari (web browser)\" rel=\"homepage\" href=\"http:\/\/www.apple.com\/safari\/\">Safari<\/a> user? Truth be told, I am not convinced that this is as big a deal as it sounds.<br \/>\nYes, any vulnerability needs investigating. But the under 10 seconds thing was only achieved because Miller simply provided a<br \/>\nMiller says that he provided the link, the judges clicked it and he then showed them he had full control of the MacBook concerned.<br \/>\nvia<\/p><\/blockquote>\n<div class=\"zemanta-pixie\" style=\"margin-top: 10px; height: 15px;\"><a class=\"zemanta-pixie-a\" title=\"Zemified by Zemanta\" href=\"http:\/\/reblog.zemanta.com\/zemified\/088638f9-3824-4142-9448-4db3216b5797\/\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"zemanta-pixie-img\" style=\"border: medium none; float: right;\" src=\"https:\/\/i0.wp.com\/img.zemanta.com\/reblog_e.png?w=525\" alt=\"Reblog this post [with Zemanta]\" \/><\/a><span class=\"zem-script more-related\"><script src=\"http:\/\/static.zemanta.com\/readside\/loader.js\" type=\"text\/javascript\"><\/script><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Image via Wikipedia from here: Mac hacked in under 10 seconds at PWN2OWN E-mail by by Davey Winder So just how secure is your Apple computer now that Mac hacker supremo Charlie Miller has broken into a MacBook in less than 10 seconds? The annual CanSecWest PWN2OWN competition is always guaranteed to grab a few &hellip; <\/p>\n<p class=\"link-more\"><a href=\"http:\/\/onthe8spot.com\/index.php\/2009\/03\/20\/why-i-dont-use-safariitwire-mac-hacked-in-under-10-seconds-at-pwn2own\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Why I Don&#039;t Use Safari::iTWire &#8211; Mac hacked in under 10 seconds at PWN2OWN&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[79],"tags":[181,290,318,748,861,862,944,1232,1265,1415,1489],"class_list":["post-1386","post","type-post","status-publish","format-standard","hentry","category-reposts","tag-apple","tag-cansecwest","tag-charlie-miller","tag-iphone","tag-mac-os","tag-macbook","tag-microsoft-windows","tag-safari","tag-security","tag-tippingpoint","tag-vulnerability"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/posts\/1386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/comments?post=1386"}],"version-history":[{"count":0,"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/posts\/1386\/revisions"}],"wp:attachment":[{"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/media?parent=1386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/categories?post=1386"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/onthe8spot.com\/index.php\/wp-json\/wp\/v2\/tags?post=1386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}