	{"id":119,"date":"2008-03-28T09:22:22","date_gmt":"2008-03-28T08:22:22","guid":{"rendered":"http:\/\/blog.intego.com\/2008\/03\/28\/mac-hacked-in-two-minutes-flat\/"},"modified":"2008-03-28T09:22:22","modified_gmt":"2008-03-28T08:22:22","slug":"mac-hacked-in-two-minutes-flat","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/","title":{"rendered":"Mac Hacked in Two Minutes Flat"},"content":{"rendered":"<p>We <a href=\"https:\/\/www.intego.com\/mac-security-blog\/hackers-vs-mac-os-x-windows-and-linux\/\">reported yesterday<\/a> on the <a href=\"http:\/\/cansecwest.com\/post\/2008-03-20.21:33:00.CanSecWest_PWN2OWN_2008\">PWN 2 OWN hacking contest<\/a> held at the CanSecWest security conference, where there was to be a showdown with a MacBook Air facing a Windows computer and a Linux computer. Well, the dust has settled, and the Mac is the winner&#8211;well, the loser. The Mac was hacked in a mere two minutes by security researcher Charlie Miller, who directed the organizers to visit a web site which contained his exploit code. To be fair, none of the computers were breached on the first day, when hackers could only access the computers over a network, but once they relaxed the rules to allow the computers to have access to the web or to e-mail, the Mac fell quickly. <\/p>\n<p>According to <a href=\"http:\/\/www.macworld.com\/article\/132733\/2008\/03\/hack.html\">Macworld reports<\/a>, &#8220;Contest rules state that Miller could only take advantage of software that was preinstalled on the Mac, so the flaw he exploited must have been accessible, or possibly inside, Apple&#8217;s Safari browser.&#8221; But Miller is not allowed to discuss the vulnerability until the contest organizers can notify the vendor. One of the judges said that Apple was already hard at work patching the flaw.<\/p>\n<p>What this points out is that there are people who are aware of serious vulnerabilities in Mac OS X, but who don&#8217;t tell Apple right away. Security Researcher Charlie Miller apparently had one up his sleeve, and saved it for the contest, rather than spill the beans to Apple. But if security researchers know of flaws, it&#8217;s sure that malicious hackers know of them as well.<\/p>\n<p>The Windows and Linux computers are still waiting to be breached&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We reported yesterday on the PWN 2 OWN hacking contest held at the CanSecWest security conference, where there was to be a showdown with a MacBook Air facing a Windows computer and a Linux computer. Well, the dust has settled, and the Mac is the winner&#8211;well, the loser. The Mac was hacked in a mere [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We reported yesterday on the PWN 2 OWN hacking contest held at the CanSecWest security conference, where there was to be a showdown with a MacBook Air\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mac Hacked in Two Minutes Flat - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We reported yesterday on the PWN 2 OWN hacking contest held at the CanSecWest security conference, where there was to be a showdown with a MacBook Air\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-03-28T08:22:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/\",\"name\":\"Mac Hacked in Two Minutes Flat - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2008-03-28T08:22:22+00:00\",\"dateModified\":\"2008-03-28T08:22:22+00:00\",\"description\":\"We reported yesterday on the PWN 2 OWN hacking contest held at the CanSecWest security conference, where there was to be a showdown with a MacBook Air\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mac Hacked in Two Minutes Flat\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Mac Hacked in Two Minutes Flat\",\"datePublished\":\"2008-03-28T08:22:22+00:00\",\"dateModified\":\"2008-03-28T08:22:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#webpage\"},\"wordCount\":272,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We reported yesterday on the PWN 2 OWN hacking contest held at the CanSecWest security conference, where there was to be a showdown with a MacBook Air","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/","og_locale":"en_US","og_type":"article","og_title":"Mac Hacked in Two Minutes Flat - The Mac Security Blog","og_description":"We reported yesterday on the PWN 2 OWN hacking contest held at the CanSecWest security conference, where there was to be a showdown with a MacBook Air","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-03-28T08:22:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/","name":"Mac Hacked in Two Minutes Flat - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2008-03-28T08:22:22+00:00","dateModified":"2008-03-28T08:22:22+00:00","description":"We reported yesterday on the PWN 2 OWN hacking contest held at the CanSecWest security conference, where there was to be a showdown with a MacBook Air","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mac Hacked in Two Minutes Flat"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Mac Hacked in Two Minutes Flat","datePublished":"2008-03-28T08:22:22+00:00","dateModified":"2008-03-28T08:22:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/#webpage"},"wordCount":272,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1V","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/119"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/119\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}