They find a couple of vulnerabilities in Safari within the Pwn2Own hacker event

This year marks the 10th anniversary of the event being held in Vancouver, and this time Pwn2Own attendees have rediscovered a vulnerability in macOS Sierra but not directly from the system, but rather accessing it from the Safari browser. In this event it is common for bugs to appear by which hackers can sneak into the system and obviously the Touch Bar of the new Apple MacBook Pro has not been without its particular hack, making it clear that there is no computer in the world that be able to resist cyber attacks.

Obviously by this we do not mean that Apple Macs are now more vulnerable than before, simply that even and having a powerful resistance to external attacks, there is always a small hole through which to sneak into the system and in this case it has been thanks to its browser, Safari, allowing the attacker to gain full access to the computer.

On the other hand, it must be made clear that they have not focused exclusively on macOS and its failures, Security breaches have also been found in the rest of the operating systems through their software, such as Adobe, Microsoft, Linux and Ubuntu.

In this event, all kinds of failures are searched to access the system and then share it with "those affected" so that they can solve the problem as soon as possible and in this case the problem of Safari for macOS it has benefited its discoverers with $ 35.000. There are several hackers and teams that have been awarded for accessing the teams, in the case of the team that got access to the 2016 MacBook Pro Touch Bar (Samuel Gross and Niklas Baumstark) took $ 28.000. Hopefully all companies take note of these errors and fix the security breaches as soon as possible.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.