[prev in list] [next in list] [prev in thread] [next in thread] 

List:       isn
Subject:    [ISN] What Elite Hackers Do Upon Encountering An iMac
From:       InfoSec News <alerts () infosecnews ! org>
Date:       2015-04-20 9:42:09
Message-ID: alpine.DEB.2.02.1504200941560.13303 () infosecnews ! org
[Download RAW message or body]

http://www.ubergizmo.com/2015/04/what-elite-hackers-do-upon-encountering-an-imac/

By Tyler Lee
ubergizmo.com
04/19/2015

When reading about malware and hacks on computers, most of the time it 
involves Windows-based machines. This isn't to say that other platforms 
and computers, like Apple's OS X, isn't invulnerable, it's just that all 
this stuff seems to happen to Windows users a lot more often than anyone 
else.

That being said, that doesn't mean that computers like the iMac are 
considered "safe". In fact recently during an Infiltrate conference that 
was held over last week, Business Insider spoke to the attendees and found 
that for the most part, most of the hackers that attended the event did 
not want to have anything to do with the iMac in their room.

Apparently this was due to the iMac being easily commandeered by a skilled 
hacker if that situation arose. This also led to the attendees coming up 
with ways to make sure that they could not be spied on by the iMac's 
camera. In one case, what the person did was turn the iMac to face the 
wall, unplug it, and for good measure, toss a towel over it to ensure 
complete privacy.

[...]



--
Evident.io - Continuous Cloud Security for AWS.
Identify and mitigate risks in 5 minutes or less.
Sign up for a free trial @ https://evident.io/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic