{"id":674,"date":"2009-02-12T15:10:24","date_gmt":"2009-02-12T14:10:24","guid":{"rendered":"http:\/\/blog.intego.com\/?p=674"},"modified":"2009-02-12T15:10:24","modified_gmt":"2009-02-12T14:10:24","slug":"safari-to-be-target-in-pwn2own-hacker-contest","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/","title":{"rendered":"Safari to Be Target in Pwn2Own Hacker Contest"},"content":{"rendered":"<p> In recent years, the <a href=\"http:\/\/cansecwest.com\/post\/2009-01-12.00:00:00.Pwn2Own_and_Agenda\">CanSecWest computer security conference<\/a> has tempted hackers (the good kind, supposedly) with Mac and Windows computers, but this year its Pwn2Own hacker contest will focus on web browsers and smartphones. Firefox 3, Safari, Internet Explorer and Opera are the targets in the browser contest, and the iPhone is one of the targets in the smartphone competition. <a href=\"http:\/\/blogs.zdnet.com\/security\/?p=2531\">ZDNet<\/a> reminds readers that, in recent years, Apple has been singled out, when a MacBook Pro was hacked via a QuickTime flaw, and a Safari vulnerability was used to hack a Mac in under two minutes. We&#8217;ll keep you posted on any Safari weaknesses that are found in this year&#8217;s event. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, the CanSecWest computer security conference has tempted hackers (the good kind, supposedly) with Mac and Windows computers, but this year its Pwn2Own hacker contest will focus on web browsers and smartphones. Firefox 3, Safari, Internet Explorer and Opera are the targets in the browser contest, and the iPhone is one of the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In recent years, the CanSecWest computer security conference has tempted hackers (the good kind, supposedly) with Mac and Windows computers, but this year\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safari to Be Target in Pwn2Own Hacker Contest - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In recent years, the CanSecWest computer security conference has tempted hackers (the good kind, supposedly) with Mac and Windows computers, but this year\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-02-12T14:10:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/\",\"name\":\"Safari to Be Target in Pwn2Own Hacker Contest - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2009-02-12T14:10:24+00:00\",\"dateModified\":\"2009-02-12T14:10:24+00:00\",\"description\":\"In recent years, the CanSecWest computer security conference has tempted hackers (the good kind, supposedly) with Mac and Windows computers, but this year\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Safari to Be Target in Pwn2Own Hacker Contest\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Safari to Be Target in Pwn2Own Hacker Contest\",\"datePublished\":\"2009-02-12T14:10:24+00:00\",\"dateModified\":\"2009-02-12T14:10:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#webpage\"},\"wordCount\":120,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In recent years, the CanSecWest computer security conference has tempted hackers (the good kind, supposedly) with Mac and Windows computers, but this year","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/","og_locale":"en_US","og_type":"article","og_title":"Safari to Be Target in Pwn2Own Hacker Contest - The Mac Security Blog","og_description":"In recent years, the CanSecWest computer security conference has tempted hackers (the good kind, supposedly) with Mac and Windows computers, but this year","og_url":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-02-12T14:10:24+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/","name":"Safari to Be Target in Pwn2Own Hacker Contest - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2009-02-12T14:10:24+00:00","dateModified":"2009-02-12T14:10:24+00:00","description":"In recent years, the CanSecWest computer security conference has tempted hackers (the good kind, supposedly) with Mac and Windows computers, but this year","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Safari to Be Target in Pwn2Own Hacker Contest"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Safari to Be Target in Pwn2Own Hacker Contest","datePublished":"2009-02-12T14:10:24+00:00","dateModified":"2009-02-12T14:10:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/safari-to-be-target-in-pwn2own-hacker-contest\/#webpage"},"wordCount":120,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-aS","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/674"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=674"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/674\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}