	{"id":746,"date":"2009-03-19T11:28:05","date_gmt":"2009-03-19T10:28:05","guid":{"rendered":"http:\/\/blog.intego.com\/?p=746"},"modified":"2009-03-19T11:28:05","modified_gmt":"2009-03-19T10:28:05","slug":"hacker-contest-mac-hacked-in-10-seconds","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/","title":{"rendered":"Hacker Contest: Mac Hacked in 10 Seconds"},"content":{"rendered":"<p>Once again, security researcher Charlie Miller has <a href=\"http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&#038;articleId=9129978\">won a hacker contest, the ConSecWest PWN2OWN Contest<\/a>, by hacking a Mac in record-breaking speed. This time it took a mere ten seconds for him to gain control of a Mac.<\/p>\n<p>To be fair, Miller used an exploit he had developed based on a flaw he had discovered some time ago. But this contest shows that there are serious flaws that are not resolved in Mac OS X. Miller had full control of the Mac he cracked merely by having the judges open Safari and simply click on a link. This shows that Mac OS X &#8211; like Windows &#8211; is highly vulnerable to &#8220;drive-by attacks&#8221; whereby users are enticed to visit web sites that can easily exploit flaws in browsers or plug-ins. Hackers who sit behind such sites can take full control of Macs that are hacked, stealing data, installing software, and much more, without requiring that a user enter a user name and password.<\/p>\n<p>Miller won a $5,000 prize, plus the MacBook that he hacked. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Once again, security researcher Charlie Miller has won a hacker contest, the ConSecWest PWN2OWN Contest, by hacking a Mac in record-breaking speed. This time it took a mere ten seconds for him to gain control of a Mac. To be fair, Miller used an exploit he had developed based on a flaw he had discovered [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Once again, security researcher Charlie Miller has won a hacker contest, the ConSecWest PWN2OWN Contest, by hacking a Mac in record-breaking speed. This\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker Contest: Mac Hacked in 10 Seconds  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Once again, security researcher Charlie Miller has won a hacker contest, the ConSecWest PWN2OWN Contest, by hacking a Mac in record-breaking speed. This\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-03-19T10:28:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/\",\"name\":\"Hacker Contest: Mac Hacked in 10 Seconds - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2009-03-19T10:28:05+00:00\",\"dateModified\":\"2009-03-19T10:28:05+00:00\",\"description\":\"Once again, security researcher Charlie Miller has won a hacker contest, the ConSecWest PWN2OWN Contest, by hacking a Mac in record-breaking speed. This\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker Contest: Mac Hacked in 10 Seconds\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Hacker Contest: Mac Hacked in 10 Seconds\",\"datePublished\":\"2009-03-19T10:28:05+00:00\",\"dateModified\":\"2009-03-19T10:28:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#webpage\"},\"wordCount\":180,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Once again, security researcher Charlie Miller has won a hacker contest, the ConSecWest PWN2OWN Contest, by hacking a Mac in record-breaking speed. This","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/","og_locale":"en_US","og_type":"article","og_title":"Hacker Contest: Mac Hacked in 10 Seconds  - The Mac Security Blog","og_description":"Once again, security researcher Charlie Miller has won a hacker contest, the ConSecWest PWN2OWN Contest, by hacking a Mac in record-breaking speed. This","og_url":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-03-19T10:28:05+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/","name":"Hacker Contest: Mac Hacked in 10 Seconds - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2009-03-19T10:28:05+00:00","dateModified":"2009-03-19T10:28:05+00:00","description":"Once again, security researcher Charlie Miller has won a hacker contest, the ConSecWest PWN2OWN Contest, by hacking a Mac in record-breaking speed. This","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Hacker Contest: Mac Hacked in 10 Seconds"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Hacker Contest: Mac Hacked in 10 Seconds","datePublished":"2009-03-19T10:28:05+00:00","dateModified":"2009-03-19T10:28:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/hacker-contest-mac-hacked-in-10-seconds\/#webpage"},"wordCount":180,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-c2","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/746"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=746"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/746\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}