[prev in list] [next in list] [prev in thread] [next in thread]
List: isn
Subject: [ISN] What Elite Hackers Do Upon Encountering An iMac
From: InfoSec News <alerts () infosecnews ! org>
Date: 2015-04-20 9:42:09
Message-ID: alpine.DEB.2.02.1504200941560.13303 () infosecnews ! org
[Download RAW message or body]
http://www.ubergizmo.com/2015/04/what-elite-hackers-do-upon-encountering-an-imac/
By Tyler Lee
ubergizmo.com
04/19/2015
When reading about malware and hacks on computers, most of the time it
involves Windows-based machines. This isn't to say that other platforms
and computers, like Apple's OS X, isn't invulnerable, it's just that all
this stuff seems to happen to Windows users a lot more often than anyone
else.
That being said, that doesn't mean that computers like the iMac are
considered "safe". In fact recently during an Infiltrate conference that
was held over last week, Business Insider spoke to the attendees and found
that for the most part, most of the hackers that attended the event did
not want to have anything to do with the iMac in their room.
Apparently this was due to the iMac being easily commandeered by a skilled
hacker if that situation arose. This also led to the attendees coming up
with ways to make sure that they could not be spied on by the iMac's
camera. In one case, what the person did was turn the iMac to face the
wall, unplug it, and for good measure, toss a towel over it to ensure
complete privacy.
[...]
--
Evident.io - Continuous Cloud Security for AWS.
Identify and mitigate risks in 5 minutes or less.
Sign up for a free trial @ https://evident.io/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic