iTnews

After 38 hours, no bite taken out of this Apple

By Dan Kaplan on Mar 8, 2006 10:19PM

An Apple system engineer’s challenge to hack into a web page hosted by a Mini Mac is closed – and nobody was able to succeed.

Dave Schroeder, the University of Wisconsin employee who launched the contest this week after he was unimpressed by a similar challenge because it gave participants local client access to Mac OS X, closed his challenge around midnight today, two days ahead of schedule.

"The response has been very strong, and the test has illustrated its point," Schroeder said on the test web site. "There were no successful access attempts of any kind, including during the 38-hour duration of the test period, nor have there been any claims of success. The host is still the same host and configuration used for the test."

He said the site was accessed roughly 500,000 times and received more than 4,000 login attempts through SSH, a tool that provides encrypted connections for accessing network machines.

The site faced two brief periods of DoS attacks and received several social engineering attempts.

Schroeder has said Macs may be vulnerable to privilege escalation but they are "very secure" because of their open-source components. 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
38afterapplebitehoursnoofoutsecuritytakenthis

Partner Content

Teaching tech teams every step of implementing a machine learning project
Promoted Content Teaching tech teams every step of implementing a machine learning project
How a 'micro data centre' enables your business, your way
Promoted Content How a 'micro data centre' enables your business, your way
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
The case for postponing mainframe migration has eroded
Partner Content The case for postponing mainframe migration has eroded

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Dan Kaplan
Mar 8 2006
10:19PM
0 Comments

Related Articles

  • Apple patches actively exploited macOS Big Sur bug
  • Apple's "Find My" feature created attack vector, researchers say
  • Emergency patches out for exploited Apple zero-days
  • Researchers devise stealthy phone tracking without fake base stations
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

Westpac promotes its head of technology to mortgage role

Westpac promotes its head of technology to mortgage role

Digital Nation

COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.