More FUD being spread... this one is a proof of concept... loophole is already closed.
To: 1234; 6SJ7; Action-America; af_vet_rr; afnamvet; Alexander Rubin; anonymous_user; ...
Second Mac OS X exploit (really? No... it's not in the wild) revealed. This one is a proof of concept for an already closed loophole in Bluetooth.
PING!
2 posted on
02/17/2006 5:51:42 PM PST by
Swordmaker
(Beware of Geeks bearing GIFs.)
To: Swordmaker
So presuming youre up to date with Tiger and Panther system updates or security updates, youve nothing to worry about. Whats more, Bluetooths range is very limited even in a worst-case scenario, youd only need to be concerned if you were accepting files from other Bluetooth-equipped Macs that were within range (Bluetooths effective range is about 30 feet or so).
3 posted on
02/17/2006 5:52:57 PM PST by
Swordmaker
(Beware of Geeks bearing GIFs.)
To: Swordmaker
According to KTWDallas, a poster on Yahoo, this is how this exploit has to work...
If a stranger shows up in your house with a laptop enabled with bluetooth and stands within 30 feet of your Panther/Tiger machine -- the machine on which you've been ignoring those "a new patch is available" messages for the past 2 years or so -- then this stranger tells you to accept his data transmission (and you do), then you'll have an infected machine... which apparently will make you pick up your computer and go find another Mac user and stand within 30 feet of them...
...sounds like a lot of work to transmit a virus.
Too much work...
4 posted on
02/17/2006 5:57:48 PM PST by
Swordmaker
(Beware of Geeks bearing GIFs.)
To: Swordmaker
First, did you bother to read the article? "The chances of Mac users actually being affected by Inqtana.A are remote, however." This isn't FUD. It's telling it like it is.
Second, you'd better get used to an increase in Mac OS X vulnerabilities. Obviously, hackers are starting to pay attention, so that means more malware being written to target the OS. But look on the bright side: Security will no doubt improve as a result -- and Mac disciples will get an opportunity to shelve their self-delusion over security invulnerability.
7 posted on
02/19/2006 12:03:38 PM PST by
Bush2000
(Linux -- You Get What You Pay For ... (tm)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson