Monday, Apr 29 2024 | Updated at 04:16 PM EDT

Stay Connected With Us F T R

Mar 18, 2017 01:32 PM EDT

The MacBook Pro with Touch Bar has been hijacked by Pwn2Own hackers during the Pwn2Own Security Conference and Competition in Vancouver. Other exploits include compromising Safari and even the heavily-guarded Edge, which aligns with the central theme of the competition that no operating system or application can be fully secured from hackers.

A team of Pwn2Own hackers was able to breach the Apple security to fully exploit Safari. This was accomplished by Samuel Groß and Niklas Baumstark by using a number of logic bugs to fully exploit Safari and took control of the MacOS on the MacBook Pro with Touch Bar. The two received $28,000 for their exploit that Baumstark revealed as only a partial success. Nonetheless, the two hackers won the crowd with its nifty message on the MacBook Pro's Touch Bar saying "pwned by niklasb and 5aelo" as posted in Groß's twitter account, Digital Trends reported.

The Pwn2Own hackers competition in Vancouver saw many impressive feats that are important to the tech community as hackers do their exploits in a safe environment. Moreover, the exploits will give developers vital information on how to further strengthen the security of their systems though Pwn2Own's organizers do not truly believe as unbreachable. The most recent exploits last Friday morning belongs to Qihoo 360 team that was able to exploit the heavily-guarded Edge, which is considered by many security experts as one of the most secure browsers to date according to Arstechnica.

The Qihoo 360 compromised Edge by escaping the Windows virtual machine it runs on or the VMWare. This was accomplished by exploiting the heap overflow bug in the Windows kernel of Edge and the uninitialized buffer vulnerability in VMWare. The team received $105,000 cash prize for their exploits amidst other notable Pwn2Own hackers' exploits from the competition organized by the Trend Micro's Zero Day Initiative Group. The contest tries to replicate how a real-world zero-day market would be and how the tech community can better prepare for it.

See Now: Covert Team Inside Newsweek Revealed as Key Players in False Human Trafficking Lawsuit

Follows macbook pro with touch bar, Touch Bar, Safari, Apple Security, Pwn2Own Hackers, Qihoo 360, VMWare Escape
© 2024 University Herald, All rights reserved. Do not reproduce without permission.

Must Read

Common Challenges for College Students: How to Overcome Them

Oct 17, 2022 PM EDTFor most people, college is a phenomenal experience. However, while higher education offers benefits, it can also come with a number of challenges to ...

Top 5 Best Resources for Math Students

Oct 17, 2022 AM EDTMath is a subject that needs to be tackled differently than any other class, so you'll need the right tools and resources to master it. So here are 5 ...

Why Taking a DNA Test is Vital Before Starting a Family

Oct 12, 2022 PM EDTIf you're considering starting a family, this is an exciting time! There are no doubt a million things running through your head right now, from ...

By Enabling The Use Of Second-Hand Technology, Alloallo Scutter It's Growth While Being Economically And Environmentally Friendly.

Oct 11, 2022 PM EDTBrands are being forced to prioritise customer lifetime value and foster brand loyalty as return on advertising investment plummets. Several brands, ...