uh oh... exploit effects windows, linux AND apple

Its processor based…they are used tcp/ip/java to get them to issue what ever malicious data to the processor.