{"id":43579,"date":"2015-07-02T09:29:12","date_gmt":"2015-07-02T16:29:12","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=43579"},"modified":"2015-07-02T09:29:12","modified_gmt":"2015-07-02T16:29:12","slug":"prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/","title":{"rendered":"Prince Harming and Dark Jedi Sent Packing by Apple&#8217;s Latest OS X Update"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-43585\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/dark-jedi-600.jpeg\" alt=\"Prince Harming and Dark Jedi\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/dark-jedi-600.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/dark-jedi-600-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/dark-jedi-600-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Earlier this week, Apple released updates for OS X and iOS, incorporating a raft of security patches. (What is the correct collective noun for patches anyway? A quilt?)<\/p>\n<p>Amongst the fixes were a <a title=\"iOS 8.4 Update Fixes Text Message Bug Causing iPhones to Restart\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-8-4-update-fixes-text-message-bug-iphone-restart\/\" target=\"_blank\">patch<\/a> for the <a title=\"Watch Out! This Boobytrapped Text Message Will Turn Off Your iPhone\" href=\"https:\/\/www.intego.com\/mac-security-blog\/crash-text-message-iphone\/\" target=\"_blank\">boobytrapped message<\/a> that mischief-makers could send to your iPhone to cause it to crash. So, if you didn&#8217;t find the idea of your friends and enemies remotely restarting your phone funny, you had best update to iOS 8.4.<\/p>\n<p>But it wasn&#8217;t just mobile users who were benefiting from improvements by Apple&#8217;s security team.<\/p>\n<p>Desktop and laptop users of OS X are advised to either update to OS X Yosemite v10.10.4, or apply Security Update 2015-005, which incorporate <a title=\"Link to Apple support advisory\" href=\"https:\/\/support.apple.com\/en-gb\/HT204942\" target=\"_blank\" rel=\"nofollow\">numerous security fixes,<\/a> including patches for remote code execution flaws, elevation of privilege vulnerabilities, browser data leakages and security bypasses.<\/p>\n<p>But alongside the fixes is <a title=\"Link to Apple security advisory\" href=\"https:\/\/support.apple.com\/en-gb\/HT204934\" target=\"_blank\" rel=\"nofollow\">another security update<\/a>\u00a0\u2014 for your Mac or MacBook&#8217;s firmware \u2014\u00a0that provides important protection against a serious vulnerability that could allow an attacker to meddle with the system BIOS, installing a rootkit which would lead to your computer being permanently backdoored.<\/p>\n<p>The so-called <a title=\"A 30 Second Nap Could Be All a Hacker Needs to Rootkit Your Mac\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rootkit-sleep\/\" target=\"_blank\">&#8220;Prince Harming&#8221; attack<\/a> was similar to the <a title=\"OS X 10.10.2 Update Released \u2013 Fixing Thunderstrike and other Security Vulnerabilities\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-10-10-2-update-released-fixing-thunderstrike-and-other-security-vulnerabilities\/\" target=\"_blank\">Thunderstrike vulnerability<\/a> patched earlier this year in OS X 10.10.2, but was considered more serious because, unlike Thunderstrike, it did not depend upon a hacker having physical access to the intended victim&#8217;s computer.<\/p>\n<p>OS X security researcher Pedro Vila\u00e7a <a title=\"Link to research\" href=\"https:\/\/reverse.put.as\/2015\/05\/29\/the-empire-strikes-back-apple-how-your-mac-firmware-security-is-completely-broken\/\" target=\"_blank\" rel=\"nofollow\">detailed<\/a> how the &#8220;Prince Harming&#8221; attack was able to exploit Mac computers made before mid-2014, exploiting the fact that their low-level firmware was left vulnerable to attack when woken from sleep mode.<\/p>\n<p>According to Vila\u00e7a, sophisticated attackers had a window of opportunity to inject malicious rootkit code into the ROM EFI boot chip. The attack could even be delivered remotely by exploiting browser vulnerabilities and tricking intended victims into visiting a boobytrapped webpages. Provided the victim&#8217;s computer had entered sleep mode during the current cycle, it could be exploited.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-42124\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/apple-tree-roots.jpeg\" alt=\"Apple tree roots\" width=\"170\" height=\"212\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/apple-tree-roots.jpeg 170w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/apple-tree-roots-120x150.jpeg 120w\" sizes=\"(max-width: 170px) 100vw, 170px\" \/>That&#8217;s bad enough, but now consider just what a rootkit can do.<\/p>\n<p>A <a title=\"Rootkits Defined: What They Are and How They Can Be Used Maliciously\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rootkits-defined-what-they-are-and-how-they-can-be-used-maliciously\/\" target=\"_blank\">rootkit can control your entire computer<\/a> from the first second that it&#8217;s turned on, running at such a low level that it can completely backdoor your system \u2014\u00a0logging every keypress, spying on your every activity, stealing and bypassing firmware passwords.<\/p>\n<p>And, once in place, a malicious rootkit could easily go undetected for a long long time.<\/p>\n<p>Frankly, the attack was likely to be beyond the capabilities of the typical attacker because of its sophistication (a financially-motivated hacker, for instance, would probably be happy to steal cash or identities in a more conventional and easy fashion), but there is no doubt that it is a technique that\u00a0would be of interest to determined hackers \u2014 such as those working for intelligence agencies and foreign governments.<\/p>\n<p>Regardless of your chances of being hit, it&#8217;s still good that Apple has now patched this security vulnerability \u2014\u00a0and a similar one known as &#8220;Dark Jedi.&#8221;<\/p>\n<p>Vila\u00e7a, who went public with details of the Prince Harming vulnerability affecting ROM EFI boot chips earlier this year in the belief that Apple already knew about the problem, <a title=\"Link to Vila\u00e7a blog post\" href=\"https:\/\/reverse.put.as\/2015\/07\/01\/reversing-prince-harmings-kiss-of-death\/\" target=\"_blank\" rel=\"nofollow\">praised<\/a> a fix being finally issued for older computers:<\/p>\n<blockquote><p>&#8220;I am very happy to see that Apple moved fast enough to fix both bugs and must congratulate them. It was a bit unexpected! Maybe full disclosure and bad publicity work after all ;-).&#8221;<\/p><\/blockquote>\n<p>If you haven&#8217;t already done so, apply <a title=\"Mac EFI Security Update 2015-001\" href=\"https:\/\/support.apple.com\/kb\/DL1823?viewlocale=en_GB&amp;locale=en_GB\" target=\"_blank\" rel=\"nofollow\">Mac EFI Security Update 2015-001<\/a>, and update to OS X Yosemite v10.10.4.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has released a firmware fix for vulnerable Macs and MacBooks, protecting against the Prince Harming and Dark Jedi attacks that could result in your computer being permanently backdoored.<\/p>\n","protected":false},"author":34,"featured_media":43597,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,190],"tags":[2335,2338,2347,168,2341,517,2344,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has released a firmware fix for vulnerable Macs and MacBooks, protecting against the Prince Harming and Dark Jedi attacks that could result in your computer being permanently backdoored.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prince Harming and Dark Jedi Sent Packing by Apple&#039;s Latest OS X Update - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has released a firmware fix for vulnerable Macs and MacBooks, protecting against the Prince Harming and Dark Jedi attacks that could result in your computer being permanently backdoored.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-02T16:29:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/\",\"name\":\"Prince Harming and Dark Jedi Sent Packing by Apple's Latest OS X Update - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#primaryimage\"},\"datePublished\":\"2015-07-02T16:29:12+00:00\",\"dateModified\":\"2015-07-02T16:29:12+00:00\",\"description\":\"Apple has released a firmware fix for vulnerable Macs and MacBooks, protecting against the Prince Harming and Dark Jedi attacks that could result in your computer being permanently backdoored.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prince Harming and Dark Jedi Sent Packing by Apple&#8217;s Latest OS X Update\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Prince Harming and Dark Jedi Sent Packing by Apple&#8217;s Latest OS X Update\",\"datePublished\":\"2015-07-02T16:29:12+00:00\",\"dateModified\":\"2015-07-02T16:29:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#webpage\"},\"wordCount\":582,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg\",\"keywords\":[\"Dark Jedi\",\"EFI\",\"Mac EFI Security Update 2015-001\",\"OS X\",\"Prince Harming\",\"Rootkit\",\"Security Update 2015-005\",\"Vulnerability\"],\"articleSection\":[\"Apple\",\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has released a firmware fix for vulnerable Macs and MacBooks, protecting against the Prince Harming and Dark Jedi attacks that could result in your computer being permanently backdoored.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/","og_locale":"en_US","og_type":"article","og_title":"Prince Harming and Dark Jedi Sent Packing by Apple's Latest OS X Update - The Mac Security Blog","og_description":"Apple has released a firmware fix for vulnerable Macs and MacBooks, protecting against the Prince Harming and Dark Jedi attacks that could result in your computer being permanently backdoored.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-07-02T16:29:12+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/","name":"Prince Harming and Dark Jedi Sent Packing by Apple's Latest OS X Update - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#primaryimage"},"datePublished":"2015-07-02T16:29:12+00:00","dateModified":"2015-07-02T16:29:12+00:00","description":"Apple has released a firmware fix for vulnerable Macs and MacBooks, protecting against the Prince Harming and Dark Jedi attacks that could result in your computer being permanently backdoored.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Prince Harming and Dark Jedi Sent Packing by Apple&#8217;s Latest OS X Update"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Prince Harming and Dark Jedi Sent Packing by Apple&#8217;s Latest OS X Update","datePublished":"2015-07-02T16:29:12+00:00","dateModified":"2015-07-02T16:29:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#webpage"},"wordCount":582,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg","keywords":["Dark Jedi","EFI","Mac EFI Security Update 2015-001","OS X","Prince Harming","Rootkit","Security Update 2015-005","Vulnerability"],"articleSection":["Apple","Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/prince-harming-and-dark-jedi-sent-packing-by-apples-latest-os-x-update\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/07\/prince-harming-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-bkT","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/43579"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=43579"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/43579\/revisions"}],"predecessor-version":[{"id":43615,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/43579\/revisions\/43615"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/43597"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=43579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=43579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=43579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}