Apple fixes one of the most dangerous OS X vulnerabilities

Thunderstrike bone x vulnerability

  Thunderstrike is the name of a vulnerability existing in the company's Macs Apple Lossless Audio CODEC (ALAC),, allowing the full exploitation of the product, but also of those connected to it. Because the vulnerability exists in the software used to start Macs, it allows the subsidiary software of the components to be infected and becomes impossible to clean.

  The vulnerability is extremely dangerous, but the good part is that it affects Macs only by physically connecting to a port, so it cannot be done remotely. For to offer the safety of users using OS X on Macs, the Apple company he fixed it in OS X Yosemite 10.2.2 this vulnerability, so hackers will not be able to use it against us.

Macs, like all computers, have firmware that swings into action when you push the power button, booting up the computer, loading the operating system, initializing hardware, and performing other functions. Some technologies, such as FireWire and Thunderbolt, interact with this firmware at an extremely low level, below Mac OS X itself, for feature and performance reasons.

  This vulnerability is solved by the Apple company separately from the ones we talked about yesterday and which affected Macs through the same physical connection to them. Few people have physical access to other users' Macs, so we're not talking about a major problem, but even so, Apple has finally fixed the vulnerabilities left by its employees, so now we won't be affected by them.