Vulnerabilities / Threats
9/28/2009
06:12 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Is Mac Security Software Necessary?

Verizon is offering security software to its Internet service customers who use Macs. But is that something Mac users really need?

Verizon on Monday introduced a security suite for Internet service customers who use Apple's Mac OS X. The company claims that it is the first major US ISP to offer its customers Mac security software.

It's a move that appears to recognize Apple's growing share of the PC market, but is it meaningful as more than a point of differentiation between Verizon and other Internet service providers? Is security software necessary for the Mac?

Apple has been touting the improved security features in its recent Snow Leopard operating system update, which suggests there's something to be worried about. But at the same time, the company's TV commercials suggest that Mac users have little to fear from malware.

And that view is easy to find online. As Mac user Bruce Etnyre observes in a post on Apple's discussion forum, "Most of the experienced users here do not recommend using antivirus software on Macs because there are no known viruses that affect it."

That's not quite accurate: There is malware that can affect the Mac. But it's not widely circulated.

To be clear, there are plenty of holes in both Apple's and Microsoft's software, as anyone who counts security patches will tell you.

The reason that security is more of a problem for Windows users than for Mac users is that the majority of malware authors are trying to find ways to exploit the holes in Windows, which can be found on about 90% of the computers out there.

Nonetheless, a quick scan of Apple's online forum confirms that some Mac users do encounter malware, like DNS changing Trojans. At the same time, security issues can be complicated and don't necessarily always involve operating system exploits.

For example, U.K.-based Colin McCleery posted in August on the Apple forum about being the victim of online fraud that he believed could only have been possible if someone had penetrated his router firewall, his OS X firewall, and installed keylogging software.

Reached in September via e-mail, McCleery said that his bank had reimbursed him and that his bank was of the opinion that the fraud was not conducted through a hole in Mac OS X. He declined to elaborate, citing the bank's ongoing investigation but suggested poor security at an online financial site he used could have been the source of his security problem.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.