The flaw allows attackers to exploit a Mac system for full privilege escalation and take over a machine.from Latest topics for ZDNet in Security http://ift.tt/1GBYk18