The so-called "Thunderstrike" hardware exploit was publicized late last year, but the hack takes advantage of a flaw in the Thunderbolt Option ROM first disclosed in 2012. Until now, that flaw hasn't been patched, but according to iMore, the latest beta of Apple's OS X 10.10.2 update fixes the problem.
Citing people familiar with the software, it was said that OS X 10.10.2 prevents the Mac's EFI boot ROM from being replaced, and also makes it impossible to roll it back to a previous state.
There is no shortage of security-focused Linux distributions on the market, and among them is Pentoo Linux. While some security-focused Linux distributions concentrate on privacy, like Tails, others like Kali Linux and Pentoo focus on security research, providing tools that enable research and penetration testing. Pentoo Linux differentiates itself from other security Linux distributions in a number of ways.
Australian Customs and Border Protection Service (ACBPS) is enthusiastic about the prospect of mandatory data-retention legislation passing in Australia, stating that it would likely use intercept powers and powers to access stored data more frequently should the legislation pass.
Organizations are seeing a sharp increase in attacks using stolen account credentials, with crooks using new techniques to beat fraud detection systems, according to Gartner.
Gartner clients have reported a "significant rise" over the last two months in the use of stolen credentials to access accounts, wrote fraud expert Avivah Litan in a blog post Thursday.
A vulnerability in the Tesla Model S fully electric luxury car allows an attacker to unlock the vehicle, start the engine and drive away with it. The report is the second one from Chinese security company Qihoo 360 regarding the security of this particular Tesla model.
In a different demonstration, researchers managed to bypass the car’s protection systems and change the lock state, turn on the headlights, honk the horn, as well as open and close the sunroof.