Attackers have already set their sights on Mac. They have been thinking of and finding ways to cash out. This talk shows one of those ways. In this presentation, I will show and demonstrate live how attackers pwn Macs using browsers running in Mac and hold the system hostage until the user posts a “ransom.”
This talk focuses on how attackers hold a Mac system hostage by using Mac-compatible browsers as its main platform of pwnage. Regardless of what browser the user prefers, the attackers are still able to take the system hostage and intimidate the user into paying “ransom” to avoid any unwanted consequences that goes beyond access to the system such as getting arrested and serving time in prison. This talk will also show how attacks like this have a silver lining, which actually help law enforcement agencies corral a certain kind of criminal.
October 21, 2014 | Tech 3 (801b) | 10:15 – 11:15