Macs Not Bulletproof, Security Researcher Proves | Channel Insider

Macs Not Bulletproof, Security Researcher Proves

Macintosh users have the distinction of being the only group of computer users who honestly believe their computers are secure from malware and attacks. And then every once in a while, someone comes along and blows that belief right out of the water. At the CanSecWest conference in Vancouver, British Columbia, March 18, security researcher […]

Mar 19, 2009
2 minute read
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Macintosh users have the distinction of being the only group of computer
users who honestly believe their computers are secure from malware and attacks.

And then every once in a while, someone comes along and blows that belief
right out of the water.

At the CanSecWest conference in Vancouver, British
Columbia, March 18, security researcher Charlie
Miller exploited a vulnerability in Safari, the default Web browser in Macs,
that enabled him to take control of the computer via a malicious link—he just
needed a vulnerable user on the other side to click on the link, and bam! He
was in.

Miller showed his chops at the conference’s PWN2OWN
competition, which he also won last year by exploiting a vulnerability he had
already discovered but hadn’t yet alerted Apple about (in truth, all
contestants start the competition with knowledge of a vulnerability that they
previously discovered—it saves time). As the winner, he takes home $5,000 and
the machine he successful hacked.

This year’s PWN2OWN competition pitted
two machines—a Sony Vaio PC running a prerelease Windows 7 beta with Internet
Explorer 8, Firefox and Google’s new Chrome browsers; and a MacBook running
Safari and Firefox.

The contest, which was sponsored by TippingPoint, actually helps the vendors
by alerting them of vulnerabilities. Winners are asked to sign a
confidentiality agreement regarding the vulnerabilities, and TippingPoint then
turns over the information to the vendors for patching.

A second security researcher, “Nils,” successfully hacked Internet Explorer
8, performing a download attack to take full control of the Sony Vaio PC. Nils
also had successfully hacked Safari shortly after Miller through a separate
vulnerability. For both hacks—and one on Firefox through a zero-day flaw—he
walked away with $15,000 total.

The competition continues March 19, with contestants trying to exploit
vulnerabilities in other technologies such as Flash, Java, .NET
and QuickTime.

 

Recommended for you...

AppDirect Acquires PartnerStack for Unified Commerce Platform
Luis Millares
Apr 14, 2026
World Quantum Day 2026: QuSecure on Urgent Need for PQC Shift
Aminu Abdullahi
Apr 14, 2026
RapidScale Set to Announce New Partner Program
Jordan Smith
Apr 14, 2026
UJET Launching New Channel-Led Global Sales Motion With Google Cloud
Jordan Smith
Apr 14, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.