![]() ![]() ![]() ![]() For anyone to say Apple is incapable of this nor would never do this I think is naive. The truth is Microsoft has done far worse than this. Unfortunately Reality Check you make it sound as if Microsoft has never done such a horrible thing. I have absolutely no problem with Apple creating FUD on their next Get a mac ad. MacDailyNews Take: Yet another reason to “ Get a Mac.” “Apple’s forgetfulness prompted Symantec analyst Anthony Roe to note: ‘This makes reliable exploitation of the vulnerability a lot easier.'” dll files, to memory to make it tougher for attackers to determine the location of critical functions or vulnerable code,” Keizer reports. ASLR is a Vista security feature that randomly assigns data and application components, such as. “A gaffe by Apple’s developers, however, makes attack easier on Vista, said InTeL, who claimed that the QuickTimePlayer binary does not have Address Space Layout Randomization (ASLR) enabled. An attack that failed would likely only crash QuickTime,” Keizer reports. “A successful exploit would let the attacker install additional malware - spyware or a spambot, say - or cull the system for information like passwords. Computer Emergency Readiness Team (US-CERT), attackers can exploit the flaw by duping users into visiting malicious or compromised Web sites hosting specially-crafted streaming content, or by convincing them to open a rigged QTL file attached to an e-mail message,” Keizer reports. “According to alerts posted by Symantec Corp. “There was no word as of Sunday whether the Mac OS X versions of the media player are also vulnerable.” “Security researchers warn that attack code targeting an unpatched bug in Apple Inc.’s QuickTime has gone public, and added that in-the-wild attacks against systems running Windows XP and Vista are probably not far behind,” Gregg Keizer reports for Computerworld. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |