• Apple’s Safari browser embarrassed at Pwn2Own, hacked in 5 seconds !


    http://www-bgr-com.vimg.net/wp-conte...screenshot.jpg
    Safari just got served. At this year’s Pwn2Own conference, security firms and enthusiasts are doing their very best to discover and deploy exploits to some of the world’s most popular browsers. Chrome, Firefox, Internet Explorer, and Safari, they’re all on the menu for conference attendees and some have definitely faired better than others. Google issued a challenge, promising $20,000 to any person or team that could crack Chrome on the conferences opening day, but the two teams scheduled to take a swing backed down. Firefox is, for the time being, still standing, and, per usual, Microsoft’s Internet Explorer was taken down without much fuss.
    But which browser faired the worst? That would be Apple’s Safari.
    A French security research firm named Vulpen managed to break into Safari running on a MacBook Air in a cool five seconds. The company noted that the Safari update issued by Apple yesterday — version 5.0.4 — fixes some of the vulnerabilities, but not all. The takedown of Safari 5.0.3 used exploits that are still available in the updated code base.
    Go ahead Apple detractors, have a little fun and comment...
    Comments 16 Comments
    1. RemyKirin's Avatar
      Bwahahahahaha..... er... i mean hmmm interesting... lol Apple in general has a habit of losing these things quickly but 5 sec in uber embarrassing, go ahead apple die hards Im really looking forward to seeing how you can spin this one.



      I know i should be nicer but i really couldnt resist this time
    1. smooth10's Avatar
      Yikes!!!
    1. chokem's Avatar
      ANYTHING can be hacked. How does this 5 second hacking affect the end consumer?
    1. Delfim's Avatar
      ^^^^ we´re not even aware of it happening What´s worrying is the fact that it can be done, easily.
    1. chokem's Avatar
      OK.........cant an Android or Berry's Browser be hacked? Again, what's the end result?
    1. Delfim's Avatar
      ^^^Oi Lordy the man is in a foul mood ...geez I just write and worry ... and a double post as well your highness...
    1. chokem's Avatar
      Im not in a bad mood at all King Del. Had a great day at church, relaxing with the family watching some NCAA basketball. Was just wanting some enlightenment, I'm kind of ignorant when it comes to smartphones.
    1. Delfim's Avatar
      ^^^^ its the basketball.
    1. chokem's Avatar
      LOL. OK King Del. Have a good day and week buddy.
    1. BHP77's Avatar
      Quote Originally Posted by chokem View Post
      ANYTHING can be hacked. How does this 5 second hacking affect the end consumer?
      What affects the consumer in this instance is that your computer can be controlled by the exploit there using in Safari without you knowing. They can run programs,scripts, pretty much whatever they want to do, remotely. This is on a PC or Mac, not smartphones. So, while there is the chance that you can be affected the chances that you, a small timer is remote. You're more vulnerable to this if you use a PC just for the fact of market saturation.

      Quote Originally Posted by chokem View Post
      OK.........cant an Android or Berry's Browser be hacked? Again, what's the end result?
      Just as you stated everything can be hacked. Android,BB,iPhone. The all have their weaknesses when it come to folks that know what they are doing. What we have to keep in mind is that the chances of this actually happing to a random person is quite slim. Most of the people that have the know how to use this are more likely to go after thing s that will make them money.

      Identity theft is something that we all need to be aware of and this could be used to aid that. Although this is a extremely complex method of going about getting that kind of info. Facebook,myspace,twitter, all of these sites list and post your info with little security to sesitive info that you have on those sites. Even forums are a good source of info to get your targets for that type of crime as most people will post name,email, city and such.

      As far as smartphones a concerned, apple does a pretty decent job of being proactive in avoiding security risks. If you're jail broken you obviously have a opened the door by bypassing most of apples built in security. Android, while secure in the OS and the way you have to go about exploiting it is rather complex, you have to get to the kernel to carry out a lot of functions. Can be done because Google allows it's developers to post immediately to the market without review. Its only after somethingnhas happened does google take action and while usually they are quick to react, the damage has most likely been done.
    1. Delfim's Avatar
      Thanks BHP !
      Happy now Lord Pillsbury ?
    1. chokem's Avatar
      Yes King Del. And thanks BHP for the explanation.
    1. bmay82's Avatar
      Lmao at you guys ;-)
    1. chokem's Avatar
      Quote Originally Posted by bmay82 View Post
      Lmao at you guys ;-)
      Entertaining isn't it?
    1. Delfim's Avatar
      BMay to the fray...Yipee !
    1. RemyKirin's Avatar
      Quote Originally Posted by BHP77 View Post
      As far as smartphones a concerned, apple does a pretty decent job of being proactive in avoiding security risks. If you're jail broken you obviously have a opened the door by bypassing most of apples built in security. Android, while secure in the OS and the way you have to go about exploiting it is rather complex, you have to get to the kernel to carry out a lot of functions. Can be done because Google allows it's developers to post immediately to the market without review. Its only after somethingnhas happened does google take action and while usually they are quick to react, the damage has most likely been done.
      Impressive spin, I didnt catch it the first read thru the sign of a master lol ;-D
    Comments Leave Comment

    Click here to log in