{"id":1438,"date":"2010-03-03T10:25:45","date_gmt":"2010-03-03T09:25:45","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1438"},"modified":"2010-03-03T10:25:45","modified_gmt":"2010-03-03T09:25:45","slug":"mac-security-expert-charlie-miller-flash-is-weak","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/","title":{"rendered":"Mac Security Expert Charlie Miller: Flash is Weak"},"content":{"rendered":"<p>A few days before the <a href=\"http:\/\/cansecwest.com\/\">CanSecWest security conference<\/a>, an Italian web site, oneitsecurity, <a href=\"http:\/\/www.oneitsecurity.it\/01\/03\/2010\/interview-with-charlie-miller-pwn2own\/\">interviews Charlie Miller<\/a>, Mac security expert, and former winner of the Pwn2Own hacking contest (and this year&#8217;s favorite).  Miller is well known for having hacked Apple&#8217;s Safari browser in this contest, two years in a row. Discussing this year&#8217;s contest, he doesn&#8217;t seem as confident about breaking through Safari&#8217;s defenses:<\/p>\n<blockquote><p>\nEverything is my target at this point. I\u2019d love to hack one of the mobile devices, but will probably end up on Safari again. I was the first to hack the iPhone and an Android device in the past, so I am comfortable with those two platforms, but its harder to exploit them. This year only one person can win per target, so my biggest obstacle will be making sure nobody beats me to the punch.\n<\/p><\/blockquote>\n<p>When asked which OS and browser combination is safest, Miller replied, &#8220;There probably isn\u2019t enough difference between the browsers to get worked up about. The main thing is not to install Flash!&#8221; Flash has been strongly criticized of late for its security weaknesses, and Adobe has been slow to fix them.<\/p>\n<p>Read the rest of the article for more about Miller&#8217;s hacking tools, and the different platforms he discusses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few days before the CanSecWest security conference, an Italian web site, oneitsecurity, interviews Charlie Miller, Mac security expert, and former winner of the Pwn2Own hacking contest (and this year&#8217;s favorite). Miller is well known for having hacked Apple&#8217;s Safari browser in this contest, two years in a row. Discussing this year&#8217;s contest, he doesn&#8217;t [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1708,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[15,57],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A few days before the CanSecWest security conference, an Italian web site, oneitsecurity, interviews Charlie Miller, Mac security expert, and former\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mac Security Expert Charlie Miller: Flash is Weak  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A few days before the CanSecWest security conference, an Italian web site, oneitsecurity, interviews Charlie Miller, Mac security expert, and former\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-03-03T09:25:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png\",\"width\":\"128\",\"height\":\"128\",\"caption\":\"Adobe Flash Player Security Update\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/\",\"name\":\"Mac Security Expert Charlie Miller: Flash is Weak - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#primaryimage\"},\"datePublished\":\"2010-03-03T09:25:45+00:00\",\"dateModified\":\"2010-03-03T09:25:45+00:00\",\"description\":\"A few days before the CanSecWest security conference, an Italian web site, oneitsecurity, interviews Charlie Miller, Mac security expert, and former\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mac Security Expert Charlie Miller: Flash is Weak\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Mac Security Expert Charlie Miller: Flash is Weak\",\"datePublished\":\"2010-03-03T09:25:45+00:00\",\"dateModified\":\"2010-03-03T09:25:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#webpage\"},\"wordCount\":219,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png\",\"keywords\":[\"Adobe\",\"Flash\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A few days before the CanSecWest security conference, an Italian web site, oneitsecurity, interviews Charlie Miller, Mac security expert, and former","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/","og_locale":"en_US","og_type":"article","og_title":"Mac Security Expert Charlie Miller: Flash is Weak  - The Mac Security Blog","og_description":"A few days before the CanSecWest security conference, an Italian web site, oneitsecurity, interviews Charlie Miller, Mac security expert, and former","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-03-03T09:25:45+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png","width":"128","height":"128","caption":"Adobe Flash Player Security Update"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/","name":"Mac Security Expert Charlie Miller: Flash is Weak - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#primaryimage"},"datePublished":"2010-03-03T09:25:45+00:00","dateModified":"2010-03-03T09:25:45+00:00","description":"A few days before the CanSecWest security conference, an Italian web site, oneitsecurity, interviews Charlie Miller, Mac security expert, and former","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mac Security Expert Charlie Miller: Flash is Weak"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Mac Security Expert Charlie Miller: Flash is Weak","datePublished":"2010-03-03T09:25:45+00:00","dateModified":"2010-03-03T09:25:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#webpage"},"wordCount":219,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-security-expert-charlie-miller-flash-is-weak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png","keywords":["Adobe","Flash"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/flash.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nc","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1438"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1438"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/1708"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}