Title: macOS 10.12.2 fixed vulnerability that allowed Thunderbolt device to obtain password from locked Mac [Video] Post by: HCK on December 20, 2016, 04:05:20 pm macOS 10.12.2 fixed vulnerability that allowed Thunderbolt device to obtain password from locked Mac [Video]
<div class="feat-image">(https://9to5mac.files.wordpress.com/2016/12/mac_pcileech.jpg?quality=82&strip=all&strip=all&w=1600&h=1000)</div> <p>Security researcher Ulf Frisk has shared details of a <a href="https://9to5mac.com/guides/vulnerability/" target="_blank">vulnerability[/url] in macOS 10.12.1 and lower that allowed anyone with physical access to a locked Mac to quickly and easily obtain the password simply by plugging in a $300 Thunderbolt device.</p> <p> <a href="https://9to5mac.com/2016/12/19/mac-thunderbolt-password/#more-459376" class="more-link">more…[/url]</p> Filed under: <a href='https://9to5mac.com/category/apple/'>Apple[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/9to5mac.wordpress.com/459376/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/9to5mac.wordpress.com/459376/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/9to5mac.wordpress.com/459376/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/9to5mac.wordpress.com/459376/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/9to5mac.wordpress.com/459376/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/9to5mac.wordpress.com/459376/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/9to5mac.wordpress.com/459376/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/9to5mac.wordpress.com/459376/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/9to5mac.wordpress.com/459376/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/9to5mac.wordpress.com/459376/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/9to5mac.wordpress.com/459376/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/9to5mac.wordpress.com/459376/" />[/url] <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/9to5mac.wordpress.com/459376/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/9to5mac.wordpress.com/459376/" />[/url] <img alt="" border="0" src="https://pixel.wp.com/b.gif?host=9to5mac.com&blog=22754319&post=459376&subd=9to5mac&ref=&feed=1" width="1" height="1" /><img alt="" border="0" src="https://pixel.wp.com/b.gif?host=9to5mac.com&blog=22754319&post=459376&subd=9to5mac&ref=&feed=1" width="1" height="1" /><div class="feedflare"> <img src="http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=1lBUStXiqGA:SaDHQObSHEs:D7DqB2pKExk" border="0"></img> (http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?a=1lBUStXiqGA:SaDHQObSHEs:D7DqB2pKExk) </div><img src="http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/1lBUStXiqGA" height="1" width="1" alt=""/> Source: macOS 10.12.2 fixed vulnerability that allowed Thunderbolt device to obtain password from locked Mac [Video] (http://feedproxy.google.com/~r/9To5Mac-MacAllDay/~3/1lBUStXiqGA/) |