Well obviously then the organizers had it in for Apple. They chose Apple products to go first and be hacked by the best hackers. They probably even had keyloggers pre-installed.
they choose apple because it will give them more publicity
if they chose to hack ie which has already been hacked since it was born, numerous time, it really wouldn't be very meaningful...
In this case, one of the rules of the competition is that you don't release the exploit publicly. The details of the exploit are given to the organizers who in turn give them to the manufacturers so they can correct the vulnerability.
It is actually a good thing. The publicity generated by the event puts pressure on the manufacturers to act.
That is not entirely correct... the hack them becuse they are low hanguing fruit. The Mac as been the first computer hacked 3 years in row so far. But this was the firstime the iPhone was compromised. This will happen more an more as Apple gains market share. This is the #1 reason Macs are slow to dent the business world.....
Please think before you post on a forum like this. What you say here is not only inaccurate, it's almost verbatim what the "contest" organisers would like you to believe in defiance of the facts.
It's a contest that professes to determine the very things you think it does, but in fact is completely rigged in terms of what hacks are attempted, who goes first, and what kind of access they get. The one thing this contest cannot ascertain, is which of the various computer systems or browsers are more vulnerable. This inability is designed right into the structure of the event.
The danger is that people like you reading accounts of the contest, assume that the first browser or OS to be compromised is the most insecure. This is why many serious security specialists don't participate in the contest. It directly misleads the public into thinking that the results actually man anything in the real world.
Please think before you post on a forum like this. What you say here is not only inaccurate, it's almost verbatim what the "contest" organisers would like you to believe in defiance of the facts.
It's a contest that professes to determine the very things you think it does, but in fact is completely rigged in terms of what hacks are attempted, who goes first, and what kind of access they get. The one thing this contest cannot ascertain, is which of the various computer systems or browsers are more vulnerable. This inability is designed right into the structure of the event.
The danger is that people like you reading accounts of the contest, assume that the first browser or OS to be compromised is the most insecure. This is why many serious security specialists don't participate in the contest. It directly misleads the public into thinking that the results actually man anything in the real world.
You should think first then post......
Everything I wrote was acurrate. Don't attack me persoanlly...we can disagree but quit the personal attack.........
I work for a fortune 100 company. We are testing 200 iPhones in our highly regulated extremely audited corporate environment. They have so many limitations in the business world concerning security and administration it is not even worth comparing to other solutions. We have 2000 Macs in our Media Departments that are segmented because of the vulerabilities from the rest of the corpoate network. Mac OSX is not as secure as you think it is just because you like your Mac and think it is cool. You can cite that there are no viruses in the wild for the Mac platform but you are kidding yourself. The can be compromised as easily or more easily than anyother system. This is fact.....
I am an Apple fan. I have Macs at home AND I have an iPhone and I will buy 2 iPads for my wife and my teenage son. But I also know their limitations. Alos I am NOT an Apple hater just becuse I disagree with you. Look up my posts and threads and you will see I don't post negative Apple stuff here.........
That is not entirely correct... the hack them becuse they are low hanguing fruit. The Mac as been the first computer hacked 3 years in row so far. But this was the firstime the iPhone was compromised. This will happen more an more as Apple gains market share. This is the #1 reason Macs are slow to dent the business world.....
Can you explain what you mean by "first"?
Do they line up every device, and every OS, for each contestant, and then say "GO!"
And the first device / system to fall is the first to fall (ie, the weakest).
Most headline I read about this contest seem to suggest that OS X was hacked; and that the others are still being worked on, and not yet successfully hacked.
But I have no idea how the competition is actually setup.
Is Charlie Miller unable to hack a Windows machine?
I mean; if they do Safari hacks on day 1, and Internet Explorer isn't up for hacking till day 3, one wouldn't say, "Oooh burn!; Safari was hacked right on the first day!! Internet Explorer is still standing!"
Actually, I believe this is the first year the iPhone was pwnd.
Every browser (except chrome, evidently) has been pwnd pretty much every year.
Macs are more secure by a combination of superior security architecture (vs. MS) and smaller market share (less desirable target). Security by obscurity is not security tho'.
And Macs are just as susceptible to social engineering attacks as other platforms. The nasty payloads just haven't targeted the Mac community yet.
Do you even know what social engineering is? Anything and anyone is susceptible someone good at social engineering. It's easy to hack when you're given passwords and codes.
Do they line up every device, and every OS, for each contestant, and then say "GO!"
And the first device / system to fall is the first to fall (ie, the weakest).
Most headline I read about this contest seem to suggest that OS X was hacked; and that the others are still being worked on, and not yet successfully hacked.
But I have no idea how the competition is actually setup.
Is Charlie Miller unable to hack a Windows machine?
I mean; if they do Safari hacks on day 1, and Internet Explorer isn't up for hacking till day 3, one wouldn't say, "Oooh burn!; Safari was hacked right on the first day!! Internet Explorer is still standing!"
I'm sure I'm missing something here.
They setup the fully patched machines and then the hackers try to compromise the machines. The Mac was compromised first for...I think 3 years in a row.......
All of this can be found if you Google Pwn2Own. Here is one link to tons of stuff concerning this subject...don't take my word for it read it for yourself..
What's illegal about it? They're not compromising any government agency or cooperation. Just a stand alone device. All hacks and/or exploits are reported to the correct parties so patches can be made.
They setup the fully patched machines and then the hackers try to compromise the machines. The Mac was compromised first for...I think 3 years in a row.......
All of this can be found if you Google Pwn2Own. Here is one link to tons of stuff concerning this subject...don't take my word for it read it for yourself..
Well obviously then the organizers had it in for Apple. They chose Apple products to go first and be hacked by the best hackers. They probably even had keyloggers pre-installed.
Okay lets be a little adult about this...
The went 'after' Apple because it has the best 'in the wild' track record when it comes to security AND Apple has no quams about boasting that fact.
Going after ANY Microsoft product?!?! Perhaps a project that the 'preschoolers' might find mildly challenging but if you notice nobody gets too much 'street cred' for boasting their latest attack on Microsoft... UNLESS perhaps the OS was just release or 'newly patched' to be 'even more secure!'
Linux is so open its not even worth talking about... It's like bragging you stole a boat load of cash when in fact you simply took a few pennies form the 'need a penny' container at the 7-11.
So yes.. the SUPER SPOTLIGHT is clearly shown on hackers who tackle Apple products and ... rightfully so...
BUT as others have already pointed out... this crap is done EVERY YEAR but these folks and yes somehow another year ticks by without an significant* virus, worm or trojan making assaults OS X based systems or devices.
* I used 'significant' simply because I couldn't with a 100% certainty say nobody on a Mac based system was ever attacked or infected by a virus in the past year while running its native OS (OS X and/or iPhone OS) not dual booting or virtual machines running alternate OS... That kinda crap clearly wouldn't count!
The went 'after' Apple because it has the best 'in the wild' track record when it comes to security AND Apple has no quams about boasting that fact.
Going after ANY Microsoft product?!?! Perhaps a project that the 'preschoolers' might find mildly challenging but if you notice nobody gets too much 'street cred' for boasting their latest attack on Microsoft... UNLESS perhaps the OS was just release or 'newly patched' to be 'even more secure!'
Linux is so open its not even worth talking about... It's like bragging you stole a boat load of cash when in fact you simply took a few pennies form the 'need a penny' container at the 7-11.
So yes.. the SUPER SPOTLIGHT is clearly shown on hackers who tackle Apple products and ... rightfully so...
BUT as others have already pointed out... this crap is done EVERY YEAR but these folks and yes somehow another year ticks by without an significant* virus, worm or trojan making assaults OS X based systems or devices.
* I used 'significant' simply because I couldn't with a 100% certainty say nobody on a Mac based system was ever attacked or infected by a virus in the past year while running its native OS (OS X and/or iPhone OS) not dual booting or virtual machines running alternate OS... That kinda crap clearly wouldn't count!
Most of what you wrote was correct except...that the Mac was compromised first based on the amount of time it took to compromise the system. If i remember right the Ubuntu system was not compromised or was compromised last....... But for 3 years in a row the Mac was compromised first....and NOT by a vurus but by malicious coded websites via Safari. The exploits the last 2 years were well known and reported to Apple but were not patched. Last year the Mac was compromised in 2 minutes......
The went 'after' Apple because it has the best 'in the wild' track record when it comes to security AND Apple has no quams about boasting that fact.
I think there is a lot of misinformation in this thread. Please do a little research. I know there is not a lot of info available for this year's contest. There is no blow by blow account like an Apple Keynote, but this is sort of how it works:
Security researchers register for the contest. They are prepared in advance for a certain exploit on a certain platform. They pick random time slots out of a hat. It just so happens that the iPhone slot was chosen first by a certain group this year. That is not to say that there weren't other groups who also had a prepared exploit against a certain device but didn't get a chance because there is only one prize per platform/browser.
The person who was registered to hack the Nokia went missing in action so no result for that device. Also it appears that there was no registered party for the Chrome platform so it went untested as well.
Comments
Well obviously then the organizers had it in for Apple. They chose Apple products to go first and be hacked by the best hackers. They probably even had keyloggers pre-installed.
they choose apple because it will give them more publicity
if they chose to hack ie which has already been hacked since it was born, numerous time, it really wouldn't be very meaningful...
they choose apple because it will give them more publicity
if they chose to hack ie which has already been hacked since it was born, numerous time, it really wouldn't be very meaningful...
Actually IE 8 on Win 7 proved to be extremely difficult to hack and required a multi step process to finally gain access.
They have hacking contests? Why is this legal???
In this case, one of the rules of the competition is that you don't release the exploit publicly. The details of the exploit are given to the organizers who in turn give them to the manufacturers so they can correct the vulnerability.
It is actually a good thing. The publicity generated by the event puts pressure on the manufacturers to act.
That is not entirely correct... the hack them becuse they are low hanguing fruit. The Mac as been the first computer hacked 3 years in row so far. But this was the firstime the iPhone was compromised. This will happen more an more as Apple gains market share. This is the #1 reason Macs are slow to dent the business world.....
Please think before you post on a forum like this. What you say here is not only inaccurate, it's almost verbatim what the "contest" organisers would like you to believe in defiance of the facts.
It's a contest that professes to determine the very things you think it does, but in fact is completely rigged in terms of what hacks are attempted, who goes first, and what kind of access they get. The one thing this contest cannot ascertain, is which of the various computer systems or browsers are more vulnerable. This inability is designed right into the structure of the event.
The danger is that people like you reading accounts of the contest, assume that the first browser or OS to be compromised is the most insecure. This is why many serious security specialists don't participate in the contest. It directly misleads the public into thinking that the results actually man anything in the real world.
They have hacking contests? Why is this legal???
It gives people an incentive to find vulnerabilities and report them so they can be patched.
Please think before you post on a forum like this. What you say here is not only inaccurate, it's almost verbatim what the "contest" organisers would like you to believe in defiance of the facts.
It's a contest that professes to determine the very things you think it does, but in fact is completely rigged in terms of what hacks are attempted, who goes first, and what kind of access they get. The one thing this contest cannot ascertain, is which of the various computer systems or browsers are more vulnerable. This inability is designed right into the structure of the event.
The danger is that people like you reading accounts of the contest, assume that the first browser or OS to be compromised is the most insecure. This is why many serious security specialists don't participate in the contest. It directly misleads the public into thinking that the results actually man anything in the real world.
You should think first then post......
Everything I wrote was acurrate. Don't attack me persoanlly...we can disagree but quit the personal attack.........
I work for a fortune 100 company. We are testing 200 iPhones in our highly regulated extremely audited corporate environment. They have so many limitations in the business world concerning security and administration it is not even worth comparing to other solutions. We have 2000 Macs in our Media Departments that are segmented because of the vulerabilities from the rest of the corpoate network. Mac OSX is not as secure as you think it is just because you like your Mac and think it is cool. You can cite that there are no viruses in the wild for the Mac platform but you are kidding yourself. The can be compromised as easily or more easily than anyother system. This is fact.....
I am an Apple fan. I have Macs at home AND I have an iPhone and I will buy 2 iPads for my wife and my teenage son. But I also know their limitations. Alos I am NOT an Apple hater just becuse I disagree with you. Look up my posts and threads and you will see I don't post negative Apple stuff here.........
That is not entirely correct... the hack them becuse they are low hanguing fruit. The Mac as been the first computer hacked 3 years in row so far. But this was the firstime the iPhone was compromised. This will happen more an more as Apple gains market share. This is the #1 reason Macs are slow to dent the business world.....
Can you explain what you mean by "first"?
Do they line up every device, and every OS, for each contestant, and then say "GO!"
And the first device / system to fall is the first to fall (ie, the weakest).
Most headline I read about this contest seem to suggest that OS X was hacked; and that the others are still being worked on, and not yet successfully hacked.
But I have no idea how the competition is actually setup.
Is Charlie Miller unable to hack a Windows machine?
I mean; if they do Safari hacks on day 1, and Internet Explorer isn't up for hacking till day 3, one wouldn't say, "Oooh burn!; Safari was hacked right on the first day!! Internet Explorer is still standing!"
I'm sure I'm missing something here.
Actually, I believe this is the first year the iPhone was pwnd.
Every browser (except chrome, evidently) has been pwnd pretty much every year.
Macs are more secure by a combination of superior security architecture (vs. MS) and smaller market share (less desirable target). Security by obscurity is not security tho'.
And Macs are just as susceptible to social engineering attacks as other platforms. The nasty payloads just haven't targeted the Mac community yet.
Do you even know what social engineering is? Anything and anyone is susceptible someone good at social engineering. It's easy to hack when you're given passwords and codes.
Can you explain what you mean by "first"?
Do they line up every device, and every OS, for each contestant, and then say "GO!"
And the first device / system to fall is the first to fall (ie, the weakest).
Most headline I read about this contest seem to suggest that OS X was hacked; and that the others are still being worked on, and not yet successfully hacked.
But I have no idea how the competition is actually setup.
Is Charlie Miller unable to hack a Windows machine?
I mean; if they do Safari hacks on day 1, and Internet Explorer isn't up for hacking till day 3, one wouldn't say, "Oooh burn!; Safari was hacked right on the first day!! Internet Explorer is still standing!"
I'm sure I'm missing something here.
They setup the fully patched machines and then the hackers try to compromise the machines. The Mac was compromised first for...I think 3 years in a row.......
All of this can be found if you Google Pwn2Own. Here is one link to tons of stuff concerning this subject...don't take my word for it read it for yourself..
http://www.computerworld.com/s/artic...?taxonomyId=17
They setup the fully patched machines and then the hackers try to compromise the machines. The Mac was compromised first for...
Actually they draw random time slots out of a hat each day.
They have hacking contests? Why is this legal???
What's illegal about it? They're not compromising any government agency or cooperation. Just a stand alone device. All hacks and/or exploits are reported to the correct parties so patches can be made.
They setup the fully patched machines and then the hackers try to compromise the machines. The Mac was compromised first for...I think 3 years in a row.......
All of this can be found if you Google Pwn2Own. Here is one link to tons of stuff concerning this subject...don't take my word for it read it for yourself..
http://www.computerworld.com/s/artic...?taxonomyId=17
That magazine caters to the windows world, nothing said in that article can be construed as fact, its mostly FUD.
Well obviously then the organizers had it in for Apple. They chose Apple products to go first and be hacked by the best hackers. They probably even had keyloggers pre-installed.
Okay lets be a little adult about this...
The went 'after' Apple because it has the best 'in the wild' track record when it comes to security AND Apple has no quams about boasting that fact.
Going after ANY Microsoft product?!?! Perhaps a project that the 'preschoolers' might find mildly challenging but if you notice nobody gets too much 'street cred' for boasting their latest attack on Microsoft... UNLESS perhaps the OS was just release or 'newly patched' to be 'even more secure!'
Linux is so open its not even worth talking about... It's like bragging you stole a boat load of cash when in fact you simply took a few pennies form the 'need a penny' container at the 7-11.
So yes.. the SUPER SPOTLIGHT is clearly shown on hackers who tackle Apple products and ... rightfully so...
BUT as others have already pointed out... this crap is done EVERY YEAR but these folks and yes somehow another year ticks by without an significant* virus, worm or trojan making assaults OS X based systems or devices.
* I used 'significant' simply because I couldn't with a 100% certainty say nobody on a Mac based system was ever attacked or infected by a virus in the past year while running its native OS (OS X and/or iPhone OS) not dual booting or virtual machines running alternate OS... That kinda crap clearly wouldn't count!
Actually they draw random time slots out of a hat each day.
You are correct........
Okay lets be a little adult about this...
The went 'after' Apple because it has the best 'in the wild' track record when it comes to security AND Apple has no quams about boasting that fact.
Going after ANY Microsoft product?!?! Perhaps a project that the 'preschoolers' might find mildly challenging but if you notice nobody gets too much 'street cred' for boasting their latest attack on Microsoft... UNLESS perhaps the OS was just release or 'newly patched' to be 'even more secure!'
Linux is so open its not even worth talking about... It's like bragging you stole a boat load of cash when in fact you simply took a few pennies form the 'need a penny' container at the 7-11.
So yes.. the SUPER SPOTLIGHT is clearly shown on hackers who tackle Apple products and ... rightfully so...
BUT as others have already pointed out... this crap is done EVERY YEAR but these folks and yes somehow another year ticks by without an significant* virus, worm or trojan making assaults OS X based systems or devices.
* I used 'significant' simply because I couldn't with a 100% certainty say nobody on a Mac based system was ever attacked or infected by a virus in the past year while running its native OS (OS X and/or iPhone OS) not dual booting or virtual machines running alternate OS... That kinda crap clearly wouldn't count!
Most of what you wrote was correct except...that the Mac was compromised first based on the amount of time it took to compromise the system. If i remember right the Ubuntu system was not compromised or was compromised last....... But for 3 years in a row the Mac was compromised first....and NOT by a vurus but by malicious coded websites via Safari. The exploits the last 2 years were well known and reported to Apple but were not patched. Last year the Mac was compromised in 2 minutes......
I don't think so.
The went 'after' Apple because it has the best 'in the wild' track record when it comes to security AND Apple has no quams about boasting that fact.
I think there is a lot of misinformation in this thread. Please do a little research. I know there is not a lot of info available for this year's contest. There is no blow by blow account like an Apple Keynote, but this is sort of how it works:
Security researchers register for the contest. They are prepared in advance for a certain exploit on a certain platform. They pick random time slots out of a hat. It just so happens that the iPhone slot was chosen first by a certain group this year. That is not to say that there weren't other groups who also had a prepared exploit against a certain device but didn't get a chance because there is only one prize per platform/browser.
The person who was registered to hack the Nokia went missing in action so no result for that device. Also it appears that there was no registered party for the Chrome platform so it went untested as well.
Okay lets be a little adult about this...
The went 'after' Apple because it has the best 'in the wild' track record when it comes to security AND Apple has no quams about boasting that fact.
But notice that nowhere does Apple say that OS X is the most secure.
http://www.apple.com/macosx/security/
That magazine caters to the windows world, nothing said in that article can be construed as fact, its mostly FUD.
Ok...how about Macworld then.....
http://www.macworld.com/article/1500...3/pwn2own.html