@mjtsai Because it's never been used to protect against malicious apps. As I said, those apps can always ask the user which files to destroy
@mjtsai Small risk? It's the exploit type used the *most* because they can exploit common, trusted applications.
-
-
@rosyna In terms of actual problems affecting Mac users, I read a lot more stories about bugs and bad apps than this type of exploit. -
@mjtsai I see the exact opposite. http://www.livehacking.com/tag/photoshop/ there are very few attacks that don't use RCEs or hijack an otherwise legit app. -
@mjtsai Getting anyone to execute a malicious app is hard from a social engineering standpoint. Exploiting a bug is significantly easier.
-
-
@mjtsai It's the exploit type used for Java, Flash, Word, Excel, network services of any type (as@drewthaler said), all document-based apps
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Rosyna Keller
Michael Tsai