×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Can a MacBook Pro Survive the Hacker Jungle?

Anonymous Coward writes | about 7 years ago

Security

b0mp (666) writes "At this year's CanSecWest 2007 conference in Vancouver, BC, a "PWN to OWN" contest will pit security researchers against a MacBook Pro in an experiment to see how well a default Mac OS X install can survive hacker scrutiny. The contest is the brainchild of CanSecWest organizer Dragos Ruiu, who was motivated in part by Apple's general anti-disclosure stance and the Mac commercials that trivializes security to the masses with humor. From the article: Ruiu plans to set up two loaded MacBook Pro machines on this own access point with default installs and with the latest security updates applied. "[Hackers] will be able to walk up to it and connect to the AP ethernet or go in over WiFi. If you exploit it, you get to go home with it," Ruiu said."

comment

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...