Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The State of Apple Security
Threaded  |  Newest First  |  Oldest First
femtobeam
femtobeam,
User Rank: Apprentice
10/15/2015 | 1:33:07 PM
Excellent Article on Apple Security
This is an excellent article on Apple Security! Thank you Sarah.
RyanSepe
RyanSepe,
User Rank: Ninja
10/19/2015 | 11:54:01 AM
Good Analogy
I heard this anology in an article involving hacking. Apple(Mac) is a barn in the middle of nowhere with no locks on the doors or bars on the windows. While Windows is in a heavily populated city with security cameras, locks, bars, etc. This analogy articulates the landscape in terms of why Apple (Mac) is less sought after in terms of exploiting.  Why there are less safeguards present for Apple(Mac) but so many need to be present for Microsoft (Windows).

As we are seeing more and more however it seems like malware and exploits are being leveraged against the Apple(Mac) environments. If we want to get as ahead of this as we can we need to hold Apple accountable. It is not forgiveable to allow a vulnerability to go unpatched for a whole year.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
10/21/2015 | 7:13:44 PM
Re: Good Analogy
Thanks for highlighting this, Ryan.  Apple fanbois and fangrrls often insist that Apple is more secure, but largely that is due to market share (at least, in the desktop/laptop world) -- and that gap is not as wide as it used to be.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
10/20/2015 | 8:58:09 PM
iOS/Mac
It's worth pointing out that iOS and Mac were found, collectively, to have by far the most discovered vulnerabilities for the year before.

Strangely enough, however, even though Android technically has far fewer vulnerabilites discovered for it than iOS does, Android suffers almost all mobile attacks because those vulnerabilities are far easier to exploit.
makemyassignments.com
makemyassignments.com,
User Rank: Strategist
10/26/2015 | 7:03:35 AM
An illusion
While reviewig the post, I would like to agree with this point that it is a truth that almost all of the Apple users purchase Apple products becuase they are less vulnerable to virus attacks.. But yes the market for Apple is minimal in comparison to that of android, so I completely agree with the post. 

Great work

 
funkdm2
funkdm2,
User Rank: Apprentice
11/23/2015 | 8:02:34 AM
Re: An illusion
I would hold that most Apple users use Apple products because: 1) they are cool (55%), 2) they are easy (45%), 3) they are less vulnerable ( <1%); based on completely non-scientific survey.
sixscrews
sixscrews,
User Rank: Apprentice
11/20/2015 | 5:46:21 AM
Hiding in the weeds
I own a farm in Wisconsin's Driftless Area. There are many ground nesting birds that arrive in the spring, build a nest in plain sight, raise a clutch of nestlings and spend the rest of the summer living off the land. Their survival rate must be over 50% or they would have disappeared long ago.

OK - some of the nests get hit but mesopredators - skunks, raccoons, 'possums and feral cats. And then there's the big, bad, human predator. I'm an accidental predator as some nests get run over by my equipment as I work the farm. But the continued existence of these ground nesters is a testimony to the low success rate of these predators.

Apple has used the same model - as cited by another writer here as 'an unlocked barn in a field.'

OK - that works provided you aren't beating your breast or singing all day long about your safe nest/barn.

Fine by me for Apple OS, but IOS is another story - it's all over the place and vulns have the potential to drill all the way into the core of the Enterprise.

Other points this slideshow raised was the seeming amateur nature of Apple malware attacks. This, again, won't last long. BSD documentation readily available as well as open source listing of the OS itself. Apple OS and BSD aren't the same thing, but vulns in BSD are sure to be present in Apple OS, and, to a certain extent, in IOS.

It's only a matter of time before the small snowball turns into an avalanche.

Funny thing, people have been predicting this for years - and it's not happened - yet. Maybe it's getting worse and maybe it's growing exponentially as one researcher said - but I don't see it - yet.

Still, as the climate changes and grasses adapt, becoming less of a hiding place, these ground nesters are some of the most vulnerable of birds - and Apple must see this, too.

I just hope they can deal with the changes before they, too, disappear.

For all the annoying corporate behavior of Apple, their offerings are inspirational and an excellent alternative to the competition, forcing it to deal with complacence and slow development cycles. It would be a shame if they got eaten by a feral cat.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type=&quot;text&quot;` via a javascript &quot;Show Password&quot; button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn&acirc;&euro;&trade;t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file