Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The State of Apple Security
Newest First  |  Oldest First  |  Threaded View
funkdm2
funkdm2,
User Rank: Apprentice
11/23/2015 | 8:02:34 AM
Re: An illusion
I would hold that most Apple users use Apple products because: 1) they are cool (55%), 2) they are easy (45%), 3) they are less vulnerable ( <1%); based on completely non-scientific survey.
sixscrews
sixscrews,
User Rank: Apprentice
11/20/2015 | 5:46:21 AM
Hiding in the weeds
I own a farm in Wisconsin's Driftless Area. There are many ground nesting birds that arrive in the spring, build a nest in plain sight, raise a clutch of nestlings and spend the rest of the summer living off the land. Their survival rate must be over 50% or they would have disappeared long ago.

OK - some of the nests get hit but mesopredators - skunks, raccoons, 'possums and feral cats. And then there's the big, bad, human predator. I'm an accidental predator as some nests get run over by my equipment as I work the farm. But the continued existence of these ground nesters is a testimony to the low success rate of these predators.

Apple has used the same model - as cited by another writer here as 'an unlocked barn in a field.'

OK - that works provided you aren't beating your breast or singing all day long about your safe nest/barn.

Fine by me for Apple OS, but IOS is another story - it's all over the place and vulns have the potential to drill all the way into the core of the Enterprise.

Other points this slideshow raised was the seeming amateur nature of Apple malware attacks. This, again, won't last long. BSD documentation readily available as well as open source listing of the OS itself. Apple OS and BSD aren't the same thing, but vulns in BSD are sure to be present in Apple OS, and, to a certain extent, in IOS.

It's only a matter of time before the small snowball turns into an avalanche.

Funny thing, people have been predicting this for years - and it's not happened - yet. Maybe it's getting worse and maybe it's growing exponentially as one researcher said - but I don't see it - yet.

Still, as the climate changes and grasses adapt, becoming less of a hiding place, these ground nesters are some of the most vulnerable of birds - and Apple must see this, too.

I just hope they can deal with the changes before they, too, disappear.

For all the annoying corporate behavior of Apple, their offerings are inspirational and an excellent alternative to the competition, forcing it to deal with complacence and slow development cycles. It would be a shame if they got eaten by a feral cat.
makemyassignments.com
makemyassignments.com,
User Rank: Strategist
10/26/2015 | 7:03:35 AM
An illusion
While reviewig the post, I would like to agree with this point that it is a truth that almost all of the Apple users purchase Apple products becuase they are less vulnerable to virus attacks.. But yes the market for Apple is minimal in comparison to that of android, so I completely agree with the post. 

Great work

 
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
10/21/2015 | 7:13:44 PM
Re: Good Analogy
Thanks for highlighting this, Ryan.  Apple fanbois and fangrrls often insist that Apple is more secure, but largely that is due to market share (at least, in the desktop/laptop world) -- and that gap is not as wide as it used to be.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
10/20/2015 | 8:58:09 PM
iOS/Mac
It's worth pointing out that iOS and Mac were found, collectively, to have by far the most discovered vulnerabilities for the year before.

Strangely enough, however, even though Android technically has far fewer vulnerabilites discovered for it than iOS does, Android suffers almost all mobile attacks because those vulnerabilities are far easier to exploit.
RyanSepe
RyanSepe,
User Rank: Ninja
10/19/2015 | 11:54:01 AM
Good Analogy
I heard this anology in an article involving hacking. Apple(Mac) is a barn in the middle of nowhere with no locks on the doors or bars on the windows. While Windows is in a heavily populated city with security cameras, locks, bars, etc. This analogy articulates the landscape in terms of why Apple (Mac) is less sought after in terms of exploiting.  Why there are less safeguards present for Apple(Mac) but so many need to be present for Microsoft (Windows).

As we are seeing more and more however it seems like malware and exploits are being leveraged against the Apple(Mac) environments. If we want to get as ahead of this as we can we need to hold Apple accountable. It is not forgiveable to allow a vulnerability to go unpatched for a whole year.
femtobeam
femtobeam,
User Rank: Apprentice
10/15/2015 | 1:33:07 PM
Excellent Article on Apple Security
This is an excellent article on Apple Security! Thank you Sarah.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1883
PUBLISHED: 2022-05-25
SQL Injection in GitHub repository camptocamp/terraboard prior to 2.2.0.
CVE-2022-21951
PUBLISHED: 2022-05-25
A Missing Encryption of Sensitive Data vulnerability in SUSE Rancher, Rancher allows attackers on the network to read and change network data due to missing encryption of data transmitted via the network when a cluster is created from an RKE template with the CNI value overridden This issue affects:...
CVE-2022-1815
PUBLISHED: 2022-05-25
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.1.2.
CVE-2022-29405
PUBLISHED: 2022-05-25
In Apache Archiva, any registered user can reset password for any users. This is fixed in Archiva 2.2.8
CVE-2022-29349
PUBLISHED: 2022-05-25
kkFileView v4.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.