Uh, right. Note the "clarification" that's now been posted to the top of the story.:
The story has been updated to clarify that participants were given local client access to the target computer.
In other words, they essentially sat the hacker down at the keyboard. He had a local account, with shell access, to a non-hardened "server". Ha! It would've taken me half this time to gain control of a WinXP box in the same situation.
What a non-story. The Slashdot thread is also interesting ...
Hacker gains operating control of a Mac Mini using an unpublished vulnerability, says machine is "easy pickings."
(link) [CNET News.com]
00:00 /Technology | 0 comments | permanent link