On Gear Live: Apple iPhone 6 giveaway!

Tuesday March 7, 2006 8:45 pm

Mac OS X: Hacked Root In Less Than 30 Minutes


Mac OS X FireWindows detractors are generally more than happy to point fingers at Microsoft’s failings in making their operating systems secure.  It’s hard to blame them, as it does seem that barely a day goes by without some new exploit popping up.  However, one has to look at the percentages of installed systems.  With Microsoft products commanding the vast majority of the market share, they make prime targets for anyone with too much free time or a grudge to bear.  In contrast, Mac OS X and Linux seem to blend quietly into the background noise, with nary a peep to be heard with regards to security problems.  Okay, that’s oversimplifying things a tad, but the basic idea remains the same - Microsoft products appear to have more security holes than their competitive counterparts due in part to market share and their public presence. 

As a case in point, an obliging Mac user set a Mac mini up and told would-be hackers to give it their best shot.  Within six hours, the mini had been compromised and root-level access obtained.  Total time to actually hack the mini?  Less than 30 minutes.  Granted, there aren’t a lot of details as to patch level, security measures taken, etc., but the hacker claimed the use of an unpublished hack that would have worked regardless of counter-measures implemented.

With regards to recent viruses and exploits related to Mac OS X, a senior director of Symantec’s Security Response Division is quoted as saying, “The lesson here is that if we look at Mac OS X and compare it to, say, Windows XP, we find that, in terms of the number of vulnerabilities, they are actually quite comparable.” 

Keep in mind that we’re not out to bash the Mac by any means, and many Gear Live members love the Mac.  Would an equivalently configured Windows or Linux system have fared any better?  Not likely.  Therefore it’s important to be mindful, that regardless of your operating system of choice, security holes do exist and it’s better to be as prepared as possible than sorry due to blissful ignorance. 

EDIT: Turns out, this is a lot less important that it first seemed. Check out the comments section, and you will find that the “hack” was made to be extremely simple - this is not something that took place in a real-world scenario.


Read More | Top Tech News


  • Related Tags:

Latest Gear Live Videos

Advertisement

Advertisement

Commenting is not available in this weblog entry.

Advertisement