A good example of defenders having to things right thousands upon thousands of time but attackers just have to find that one gap to exploit. An injection flaw that gave access to all the files on the Mac.
— Read on http://www.wired.co.uk/article/macos-process-injection-flaw
You must be logged in to post a comment.