Pages: [1]   Go Down
  Print  
Author Topic: Macs can be remotely infected with firmware malware that remains after reformatting  (Read 377 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: August 05, 2015, 03:00:15 am »

Macs can be remotely infected with firmware malware that remains after reformatting

<article>
   <section class="page">
<p>
When companies claim their products are unhackable or invulnerable, it must be like waving a red flag in front of bulls as it practically dares security researchers to prove otherwise. Apple previously claimed that Macs were not vulnerable to the same firmware flaws that could backdoor PCs, so researchers proved they could remotely infect Macs with a firmware worm that is so tough to detect and to get rid of that they suggested it presents a toss your Mac in the trash situation.</p><p>
Corey Kallenberg, Xeno Kovah and Trammell Hudson will present “Thunderstrike 2: Sith Strike” at Black Hat USA on August 6. “Although several attacks have been presented against Mac firmware, unlike their PC counterparts, all of them required physical presence to perform,” they wrote in the description of their talk. “Interestingly, when contacted with the details of previously disclosed PC firmware attacks, Apple systematically declared themselves not vulnerable. This talk will provide conclusive evidence that Macs are in fact vulnerable to many of the software-only firmware attacks that also affect PC systems. In addition, to emphasize the consequences of successful exploitation of these attack vectors, we will demonstrate the power of the dark side by showing what Mac firmware malware is capable of.”</p><p class="jumpTag"><a href="/article/2955707/security/macs-can-be-remotely-infected-with-firmware-malware-that-remains-after-reformatting.html#jump">To read this article in full or to leave a comment, please click here[/url]</p></section></article>

Source: Macs can be remotely infected with firmware malware that remains after reformatting
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: