Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The State of Apple Security
Newest First  |  Oldest First  |  Threaded View
funkdm2
50%
50%
funkdm2,
User Rank: Apprentice
11/23/2015 | 8:02:34 AM
Re: An illusion
I would hold that most Apple users use Apple products because: 1) they are cool (55%), 2) they are easy (45%), 3) they are less vulnerable ( <1%); based on completely non-scientific survey.
sixscrews
50%
50%
sixscrews,
User Rank: Apprentice
11/20/2015 | 5:46:21 AM
Hiding in the weeds
I own a farm in Wisconsin's Driftless Area. There are many ground nesting birds that arrive in the spring, build a nest in plain sight, raise a clutch of nestlings and spend the rest of the summer living off the land. Their survival rate must be over 50% or they would have disappeared long ago.

OK - some of the nests get hit but mesopredators - skunks, raccoons, 'possums and feral cats. And then there's the big, bad, human predator. I'm an accidental predator as some nests get run over by my equipment as I work the farm. But the continued existence of these ground nesters is a testimony to the low success rate of these predators.

Apple has used the same model - as cited by another writer here as 'an unlocked barn in a field.'

OK - that works provided you aren't beating your breast or singing all day long about your safe nest/barn.

Fine by me for Apple OS, but IOS is another story - it's all over the place and vulns have the potential to drill all the way into the core of the Enterprise.

Other points this slideshow raised was the seeming amateur nature of Apple malware attacks. This, again, won't last long. BSD documentation readily available as well as open source listing of the OS itself. Apple OS and BSD aren't the same thing, but vulns in BSD are sure to be present in Apple OS, and, to a certain extent, in IOS.

It's only a matter of time before the small snowball turns into an avalanche.

Funny thing, people have been predicting this for years - and it's not happened - yet. Maybe it's getting worse and maybe it's growing exponentially as one researcher said - but I don't see it - yet.

Still, as the climate changes and grasses adapt, becoming less of a hiding place, these ground nesters are some of the most vulnerable of birds - and Apple must see this, too.

I just hope they can deal with the changes before they, too, disappear.

For all the annoying corporate behavior of Apple, their offerings are inspirational and an excellent alternative to the competition, forcing it to deal with complacence and slow development cycles. It would be a shame if they got eaten by a feral cat.
makemyassignments.com
50%
50%
makemyassignments.com,
User Rank: Strategist
10/26/2015 | 7:03:35 AM
An illusion
While reviewig the post, I would like to agree with this point that it is a truth that almost all of the Apple users purchase Apple products becuase they are less vulnerable to virus attacks.. But yes the market for Apple is minimal in comparison to that of android, so I completely agree with the post. 

Great work

 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/21/2015 | 7:13:44 PM
Re: Good Analogy
Thanks for highlighting this, Ryan.  Apple fanbois and fangrrls often insist that Apple is more secure, but largely that is due to market share (at least, in the desktop/laptop world) -- and that gap is not as wide as it used to be.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/20/2015 | 8:58:09 PM
iOS/Mac
It's worth pointing out that iOS and Mac were found, collectively, to have by far the most discovered vulnerabilities for the year before.

Strangely enough, however, even though Android technically has far fewer vulnerabilites discovered for it than iOS does, Android suffers almost all mobile attacks because those vulnerabilities are far easier to exploit.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
10/19/2015 | 11:54:01 AM
Good Analogy
I heard this anology in an article involving hacking. Apple(Mac) is a barn in the middle of nowhere with no locks on the doors or bars on the windows. While Windows is in a heavily populated city with security cameras, locks, bars, etc. This analogy articulates the landscape in terms of why Apple (Mac) is less sought after in terms of exploiting.  Why there are less safeguards present for Apple(Mac) but so many need to be present for Microsoft (Windows).

As we are seeing more and more however it seems like malware and exploits are being leveraged against the Apple(Mac) environments. If we want to get as ahead of this as we can we need to hold Apple accountable. It is not forgiveable to allow a vulnerability to go unpatched for a whole year.
femtobeam
50%
50%
femtobeam,
User Rank: Apprentice
10/15/2015 | 1:33:07 PM
Excellent Article on Apple Security
This is an excellent article on Apple Security! Thank you Sarah.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-4020
PUBLISHED: 2021-11-27
janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-23654
PUBLISHED: 2021-11-26
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via C...
CVE-2021-43785
PUBLISHED: 2021-11-26
@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious...
CVE-2021-43776
PUBLISHED: 2021-11-26
Backstage is an open platform for building developer portals. In affected versions the auth-backend plugin allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other se...
CVE-2021-41243
PUBLISHED: 2021-11-26
There is a Potential Zip Slip Vulnerability and OS Command Injection Vulnerability on the management system of baserCMS. Users with permissions to upload files may upload crafted zip files which may execute arbitrary commands on the host operating system. This is a vulnerability that needs to be add...