Using software that makes burning DVDs from a Mac a breeze can be as easy as selecting a DVD and plugging it into a USB cable.
Read moreA recent study conducted by security firm FireEye found that the Mac OS X FireFox plugin for burners has been found to be the culprit in the widespread attack of a number of major software companies.
The study, which also uncovered several security vulnerabilities, found that a large number of these vulnerabilities could be exploited by a malicious attacker to compromise the systems of the affected software companies or users.
The researchers discovered that the attack is not limited to Macs running Mac OSX 10.6.8.
The vulnerabilities are described as “vulnerability in the FireFox application, which allows the remote attacker to execute arbitrary code in a privileged context via a crafted Flash file.”
This attack is also not limited only to Mac users, as the researchers also found that it could be deployed on a wide range of Windows machines running the operating system.
“It is very likely that many of these attacks are being carried out on Macs using this plugin,” FireEye researcher Dan Bresnahan wrote in the paper.
“The only way to be certain is to do a full penetration test.
This is a very good way to test the software.”
A number of the vulnerabilities were discovered by researchers working for a security firm that works with some of the world’s biggest technology companies.
The firm has since released a patch for the Firefox plugin, but many other companies have not.
While there is no specific evidence that the FireFOX plugin is the cause of the attacks, the researchers believe that it is a major culprit because of the number of companies that have been affected by it.
“This is one of the largest plugins in the OS X ecosystem, and the vulnerability that has been discovered in this case is a huge one,” said Bresnaahan.
“As the OSX team continues to update FireFox, it is important to keep an eye on this vulnerability.”
In a statement, Apple said: “Firefox users should be aware of the potential impact of this vulnerability and update their software to fix it.
We recommend all users upgrade to the latest version of Firefox and continue to use this plugin.”
The researchers are now asking for the public’s help in tracking down the culprits, which include companies including Microsoft, Adobe, IBM and Canonical.