Vulnerabilities / Threats

An Apple Fanboi Writing Malware For Mac OSX

50%
50%

At the Dark Reading News Desk at Black Hat Aug. 5, Patrick Wardle, director of research for Synack and Apple fan, spoke to Dark Reading senior editor Sara Peters about his session "Writing Bad @$$ Malware for OS X," why he chose to write exploits for an OS he loves, how he circumvented its best protections, and what Apple has been like to work with on vulnerability disclosure.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
8/19/2015 | 12:51:53 PM
Re: Apple vs Windows
It depends on what your prefer. Yes, in the laptop realm macs will tend to be more expensive but it depends on what you are going for. Windows is the software while Apple is responsible for both the hardware and software even though their hardware is from other 3rd parties. Hence, why many different companies sell windows computers. I go back and forth. I prefer Apple for the aesthetic hardware. But prefer Windows for the OS....Hence why bootcamp is perfect for me...Running Windows OS on Apple hardware. Apples to apples, you are right computers with Windows tend to be less costly but it all comes down to the manufacturing company. For example look at Alienware. Their windows PC's are expensive as well and could defintely compare with Apple pricing.
saiopen
50%
50%
saiopen,
User Rank: Apprentice
8/19/2015 | 4:30:05 AM
Re: Apple vs Windows
i prefer windows as its good in cost
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
8/18/2015 | 2:30:09 PM
Apple vs Windows
A very good analogy that I've heard used between Mac and Windows in terms of being exploitable and their security posture is that Mac is an unlocked barn in the middle of nowhere, less of a target and therefore less precaution is taken to secure. While Windows is in a high crime, city-esque populated area. All the windows and doors are locked and barred but it is constantly trying to be exploited and therefore new means and methods are being devised to do so. As the video states, it very heavily has to do with size of target. However, this does not mean that mac should be lax in any way shape or form.
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Email, Social Media Still Security Nightmares
Dark Reading Staff 6/15/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12526
PUBLISHED: 2018-06-21
Telesquare SDT-CS3B1 and SDT-CW3B1 devices through 1.2.0 have a default factory account. Remote attackers can obtain access to the device via TELNET using a hardcoded account.
CVE-2018-1253
PUBLISHED: 2018-06-21
RSA Authentication Manager Operation Console, versions 8.3 P1 and earlier, contains a stored cross-site scripting vulnerability. A malicious Operations Console administrator could potentially exploit this vulnerability to store arbitrary HTML or JavaScript code through the web interface. When other ...
CVE-2018-1254
PUBLISHED: 2018-06-21
RSA Authentication Manager Security Console, versions 8.3 P1 and earlier, contains a reflected cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim Security Console administrator to supply malicious HTML or JavaScript...
CVE-2018-12615
PUBLISHED: 2018-06-21
An issue was discovered in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp in Phusion Passenger before 5.3.2. The set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups are actually being set while lowering privileges.
CVE-2016-10723
PUBLISHED: 2018-06-21
** DISPUTED ** An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurre...