Leopard falls first in hacking contest
By Stuart Turton
Posted on 28 Mar 2008 at 09:50
Leopard has been hacked in under two minutes using a flaw in Safari, while Vista and Ubuntu continue to stand firm.
The competition took place at the CanSecWest security conference in Vancouver, and pitted hackers against three laptops running Vista Ultimate SP1, Leopard OS X 10.5.2 and Ubuntu 7.10 to discover which was the most vulnerable.
A MacBook Air running a fully-patched version of Leopard succumbed in under two minutes, hacked by security researcher Charlie Miller who used a technique similar to a phishing attack, which involved clicking a link to a website containing malicious code, which allowed him to remotely access the machine.
Miller had been working on the exploit in the three weeks following the announcement of the challenge. He previously made a name for himself hacking the iPhone, though the Leopard exploit was far more lucrative bagging him a £5,000 prize from sponsor Tipping Point, who has notified Apple of the flaw.
At the time of writing both Vista and Ubuntu have yet to be compromised.
Is your business a social business? For helpful info and tips visit our hub.
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- I went to Glastonbury and the only thing that got high was my smartphone
- Meet the robots helping teach children
- PaperLater: would you pay to print the internet?
- Amazon vs Kobo: how much to make the ebook switch?
- Phishing emails: how I nearly got caught out
- Top five VoIP mistakes
- How to add in-app purchasing to an iPhone, Android or Windows app
- Remote-control ransomware: TeamViewer and software hardball
- Why laptops with serial ports matter to the Internet of Things
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office
- How to write your company's IT security policy
- Raspberry Pi and Wolfram: a must-have for every child