Posted on 06/01/2010 7:28:23 AM PDT by markomalley
That was over 2 years ago and it was done under laboratory conditions:
“the rules were relaxed so that attackers could direct contest organizers using the computers to do things like visit Web sites or open e-mail messages.”
It seems if holes are found in MacOS, they get plugged very quickly and easily.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.