{"id":20907,"date":"2021-04-09T23:09:19","date_gmt":"2021-04-09T17:39:19","guid":{"rendered":"https:\/\/valeurbit.com\/blog\/?p=20907"},"modified":"2021-04-09T23:09:23","modified_gmt":"2021-04-09T17:39:23","slug":"serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers","status":"publish","type":"post","link":"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/","title":{"rendered":"Serious vulnerability for hacker attacks found in Apple Mac computers"},"content":{"rendered":"\n<p>A Mac, running on the newly introduced chip M1, can be hacked via the browser &#8211; such a conclusion\u00a0came\u00a0researchers in the field of cyber security\u00a0at Cornell University\u00a0.<\/p>\n\n\n\n<p>Apple&#8217;s\u00a0new computers\u00a0were susceptible to attacks even if JavaScript was disabled in the browser.\u00a0The vulnerability allows hackers to see a user&#8217;s web activity using a function in the sequence of data packets.\u00a0This way you can not only bypass JavaScript, but also privacy technologies such as VPN and TOR.<\/p>\n\n\n\n<p>The researchers tested Intel Core, AMD Ryzen,\u00a0Samsung\u00a0Exynos and Apple M1\u00a0platforms\u00a0.\u00a0It turned out that all processors are somehow vulnerable to such a hack, but most of all &#8211; Apple M1 and Samsung Exynos chips.<\/p>\n\n\n\n<p>Earlier, researchers at Red Canary discovered that tens of thousands of Macs around the world are infected with the Silver Sparrow virus.\u00a0So far, it represents only a potential danger, since it is in sleep mode and only exchanges data with the hackers&#8217; control servers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Mac, running on the newly introduced chip M1, can be hacked via the browser &#8211; such a conclusion\u00a0came\u00a0researchers in the field of cyber security\u00a0at Cornell University\u00a0. Apple&#8217;s\u00a0new computers\u00a0were susceptible to attacks even if JavaScript was disabled in the browser.\u00a0The vulnerability allows hackers to see a user&#8217;s web activity using a function in the sequence&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Serious vulnerability for hacker attacks found in Apple Mac computers | ValeurBit Infosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Serious vulnerability for hacker attacks found in Apple Mac computers | ValeurBit Infosec\" \/>\n<meta property=\"og:description\" content=\"A Mac, running on the newly introduced chip M1, can be hacked via the browser &#8211; such a conclusion\u00a0came\u00a0researchers in the field of cyber security\u00a0at Cornell University\u00a0. Apple&#8217;s\u00a0new computers\u00a0were susceptible to attacks even if JavaScript was disabled in the browser.\u00a0The vulnerability allows hackers to see a user&#8217;s web activity using a function in the sequence...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/\" \/>\n<meta property=\"og:site_name\" content=\"ValeurBit Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/valeurbitinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-09T17:39:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T17:39:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:site\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\",\"name\":\"Valeurbit Infosec\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/valeurbitinfo\/\",\"https:\/\/www.instagram.com\/valeurbit\",\"https:\/\/www.linkedin.com\/company\/valeurbit-infosec\/\",\"https:\/\/twitter.com\/valeurbit\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"contentUrl\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"width\":1080,\"height\":512,\"caption\":\"Valeurbit Infosec\"},\"image\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"name\":\"ValeurBit Infosec\",\"description\":\"Cyber Security Company\",\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/valeurbit.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/#webpage\",\"url\":\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/\",\"name\":\"Serious vulnerability for hacker attacks found in Apple Mac computers | ValeurBit Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\"},\"datePublished\":\"2021-04-09T17:39:19+00:00\",\"dateModified\":\"2021-04-09T17:39:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/valeurbit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Serious vulnerability for hacker attacks found in Apple Mac computers\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/#webpage\"},\"author\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\"},\"headline\":\"Serious vulnerability for hacker attacks found in Apple Mac computers\",\"datePublished\":\"2021-04-09T17:39:19+00:00\",\"dateModified\":\"2021-04-09T17:39:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/serious-vulnerability-for-hacker-attacks-found-in-apple-mac-computers\/#webpage\"},\"wordCount\":173,\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"articleSection\":[\"Valeurbit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\",\"name\":\"ValeurBit\",\"sameAs\":[\"https:\/\/valeurbit.com\/blog\"],\"url\":\"https:\/\/valeurbit.com\/blog\/author\/valeurbit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/20907"}],"collection":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/comments?post=20907"}],"version-history":[{"count":0,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/20907\/revisions"}],"wp:attachment":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/media?parent=20907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/categories?post=20907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/tags?post=20907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}