A 7-year-old exploit still exists in Mac OS Lion that reveals user passwords from memory.
Forensic software can exploit a seven-year-old FireWire design error to snoop system memory for passwords, even for devices that are locked or in sleep mode.
Updated forensic software can steal Apple OS X login passwords in minutes, even when the devices are locked or asleep.
To be successful, however, users of the software, Passware Kit Forensic v11, must have physical access to the target Mac device, as well as a FireWire cable connection. At that point, the software can capture the password data from the Mac’s memory, even on the latest version of Apple’s operating system, Mac OS X Lion.
Sourced by: Roy W. Nash
Your love for Linux might help get you a job.
IT is changing organizations across the globe, impacting enterprises, governments and the wider public sector.Read More
del.icio.us has been blacklisted by Google.
In a move that caught many publishers off guard, Google blacklisted bit.ly several days ago.Read More