{"id":4661,"date":"2017-10-02T23:44:13","date_gmt":"2017-10-03T03:44:13","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall17\/?p=4661"},"modified":"2017-10-02T23:44:20","modified_gmt":"2017-10-03T03:44:20","slug":"millions-of-up-to-date-apple-macs-remain-vulnerable-to-efi-firmware-hacks","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/2017\/10\/02\/millions-of-up-to-date-apple-macs-remain-vulnerable-to-efi-firmware-hacks\/","title":{"rendered":"Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>According to the article, it describes that researchers from security firm Duo Labs analyzed over 73,000 Macs system and discovered that a surprising number of Apple Mac computers either fails to install patches for EFI firmware vulnerabilities or doesn\u2019t receive any update at all. The Apple uses Intel-designed Extensible Firmware Interface (EFI) for computers that work at a lower level than a computer\u2019s OS and controls the boot process. However, the researchers found out that Apple limits the EFI updates to their Mac systems. Furthermore, the article mentions, Apple does not even warn its users of the failed EFI update process or technical glitch, which leaving millions of Macs users vulnerable to sophisticated and advanced persistent cyber attacks<\/p>\n<p>&nbsp;<\/p>\n<p>https:\/\/thehackernews.com\/2017\/09\/apple-mac-efi-malware.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; According to the article, it describes that researchers from security firm Duo Labs analyzed over 73,000 Macs system and discovered that a surprising number of Apple Mac computers either fails to install patches for EFI firmware vulnerabilities or doesn\u2019t receive any update at all. The Apple uses Intel-designed Extensible Firmware Interface (EFI) for computers [&hellip;]<\/p>\n","protected":false},"author":12917,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-4661","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/users\/12917"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/comments?post=4661"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4661\/revisions"}],"predecessor-version":[{"id":4662,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4661\/revisions\/4662"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/media?parent=4661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/categories?post=4661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/tags?post=4661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}