Mac OS X 10.7.3 Lion login passwords exposed

(19 views)

The Mac OS X Lion 10.7.3 update turns on a system-wide debug log file which contains the login passwords of every user who has logged in since this update was applied. You are only vulnerable if you upgraded to Lion and kept your folders encrypted using FileVault 1. If you use FileVault 2, you will not be affected by this vulnerability. So what does this mean for Mac users? Simply, if your Mac is stolen or someone gains physical access, they will have full access to your system including encrypted files. The debug log file is only kept by default for several weeks, which means if you installed this update some three months ago, your login credentials will not exist. This vulnerability allows users to access encrypted files and every file that requires your credentials. It also allows someone to read your Time Machine security key, as your login password is stored....

May 11, 2012
Subscribe
Notify of
guest
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Amanda Franky
7 months ago

A great hacker is really worthy of good recommendation , Henry
really help to get all the evidence i needed against my husband and
and i was able to confront him with this details from this great hacker
to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, Henryclarkethicalhacker at g mail com, and you can text, call him on whatsapp him on +12014305865, or +17736092741, 

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.