Apple Mac traced to new security vulnerabilities: Formatting is useless
OS X security expert Pedro Vilaca recently discovered a body exists in the old section of Mac security vulnerability that allows an attacker to gain control of the device, even if the user of the infected computer's system drive is formatted and can not eliminate the threat.
Pedro Vilaca discovered vulnerabilities are published for more than 1 year old section of Mac. When these devices to wake from sleep mode, originally used to protect the system firmware security measures and not activated immediately, which means it briefly exposed to danger.
Want to successfully exploit this vulnerability, an attacker would first need to pass a malicious Web site, e-mail attacks, or otherwise obtain root access to the OS X. When implanted in a well-designed program, it will wait for the Mac goes to sleep mode (or force it in), and then in its wake brush into the firmware. Once successfully entered, the rootkit will be difficult to detect or remove, even reinstall the system or format will not work.
Currently, according to Vilaca tests such attacks applies to Retina MacBook Pro, MacBook Pro 8.2 and MacBook Air, even if they are running Apple's latest EFI firmware. However, in the last year of the launch of new models it does not seem to be affected, it may be because Apple is already aware of the existence of the problem and its repair.
meizu phone mx3