{"id":2418,"date":"2011-03-10T18:33:47","date_gmt":"2011-03-10T17:33:47","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2418"},"modified":"2011-03-10T18:33:47","modified_gmt":"2011-03-10T17:33:47","slug":"macbook-and-safari-cracked-at-pwn2own","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/","title":{"rendered":"MacBook and Safari Cracked at Pwn2Own"},"content":{"rendered":"<p>ZDNet <a href=\"http:\/\/www.zdnet.com\/blog\/security\/safarimacbook-first-to-fall-at-pwn2own-2011\/8358\">reports<\/a> that the first computer to fall in the 2011 Pwn2Own hacking contest is a MacBook, and the crack was done via a Safari vulnerability. The winning team, from the French company VUPEN, exploited a weakness in WebKit, the framework used to display web pages in Safari and other applications. They said there are many WebKit vulnerabilities, and the exploit did not even crash the browser, so, in a real world situation, users could be attacked without any knowledge.  <\/p>\n<p>In other news, <a href=\"http:\/\/www.macworld.com\/article\/158476\/2011\/03\/chrome_pwn2own.html\">no one wanted to bother cracking Google&#8217;s Chrome browser<\/a>. &#8220;If Chrome comes out unscathed, as it now appears it will, the browser will have survived three consecutive Pwn2Owns, a record.&#8221; <\/p>\n","protected":false},"excerpt":{"rendered":"<p>ZDNet reports that the first computer to fall in the 2011 Pwn2Own hacking contest is a MacBook, and the crack was done via a Safari vulnerability. The winning team, from the French company VUPEN, exploited a weakness in WebKit, the framework used to display web pages in Safari and other applications. They said there are [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1647,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[3151,115,144,148],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"ZDNet reports that the first computer to fall in the 2011 Pwn2Own hacking contest is a MacBook, and the crack was done via a Safari vulnerability. The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MacBook and Safari Cracked at Pwn2Own  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"ZDNet reports that the first computer to fall in the 2011 Pwn2Own hacking contest is a MacBook, and the crack was done via a Safari vulnerability. The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-03-10T17:33:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"136\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg\",\"width\":\"128\",\"height\":\"136\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/\",\"name\":\"MacBook and Safari Cracked at Pwn2Own - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#primaryimage\"},\"datePublished\":\"2011-03-10T17:33:47+00:00\",\"dateModified\":\"2011-03-10T17:33:47+00:00\",\"description\":\"ZDNet reports that the first computer to fall in the 2011 Pwn2Own hacking contest is a MacBook, and the crack was done via a Safari vulnerability. The\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MacBook and Safari Cracked at Pwn2Own\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"MacBook and Safari Cracked at Pwn2Own\",\"datePublished\":\"2011-03-10T17:33:47+00:00\",\"dateModified\":\"2011-03-10T17:33:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#webpage\"},\"wordCount\":121,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg\",\"keywords\":[\"Apple\",\"Safari\",\"Vulnerability\",\"WebKit\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"ZDNet reports that the first computer to fall in the 2011 Pwn2Own hacking contest is a MacBook, and the crack was done via a Safari vulnerability. The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/","og_locale":"en_US","og_type":"article","og_title":"MacBook and Safari Cracked at Pwn2Own  - The Mac Security Blog","og_description":"ZDNet reports that the first computer to fall in the 2011 Pwn2Own hacking contest is a MacBook, and the crack was done via a Safari vulnerability. The","og_url":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-03-10T17:33:47+00:00","og_image":[{"width":"128","height":"136","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg","width":"128","height":"136"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/","name":"MacBook and Safari Cracked at Pwn2Own - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#primaryimage"},"datePublished":"2011-03-10T17:33:47+00:00","dateModified":"2011-03-10T17:33:47+00:00","description":"ZDNet reports that the first computer to fall in the 2011 Pwn2Own hacking contest is a MacBook, and the crack was done via a Safari vulnerability. The","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"MacBook and Safari Cracked at Pwn2Own"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"MacBook and Safari Cracked at Pwn2Own","datePublished":"2011-03-10T17:33:47+00:00","dateModified":"2011-03-10T17:33:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#webpage"},"wordCount":121,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg","keywords":["Apple","Safari","Vulnerability","WebKit"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/macbook-and-safari-cracked-at-pwn2own\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/safari1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-D0","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2418"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2418"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2418\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/1647"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}