Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:00 PM

Steve Jobs And Tech Security

Apple's products continue to highlight what relatively secure operating system environments look like.

The death of Steve Jobs is triggering not a little reflection over the impact that one man could have over the form and function of the technology we use every day. The Apple II and Apple Macintosh were systems on which many of today's technology professionals first cut their teeth. In more recent years, the iPod, iPhone, and iPad came to reshape or outright define our notions of what constituted an MP3 player, smartphone, or tablet.

At least for the past 10 years, however, what's also been notable with Apple products is the degree to which their users don't have to worry about security. Not that Apple's operating systems are 100% secure; they're not. But with the large quantity of malware targeting Windows operating systems increasing this year by 21%, and the quantity of malware targeting Google's Android smartphone and tablet operating system increasing by 400%, Apple's products are notable for the exploits they're not experiencing.

Why don't Apple products experience the same levels of malware as Windows or Android, and how much of that can be traced to Jobs' legacy? The leading explanation has long been that attacking Apple desktops and laptops offers insufficient benefits to merit the time and cost required to develop the necessary malware. According to Net Applications, Windows controls 86% of the PC operating system market, while Apple accounts for only 6%, and Linux, 1%. Why attack Apple, when there are still so many people still using Windows XP?

Furthermore, the Windows security situation has created a vicious security circle. For example, one of the leading scams--free AV--doesn't even exploit Windows. Instead, it makes people think that their Windows systems have been compromised, getting them to pony up $49.95 for bogus antivirus software, or more for the equally bogus "premium edition." In other words, criminals are launching social engineering attacks predicated on the legacy of poor Windows security.

On the Apple front, Jobs notably chose to base the Apple OS X operating system, introduced for desktops in 2001, on Unix, which arguably made it more secure than its Windows rival. But Apple OS X isn't invulnerable--far from it. In fact, at the Black Hat conference in Las Vegas this summer, security researchers demonstrated that Mac OS X was vulnerable to the advanced attacks plaguing such businesses as RSA. Still, few people--if any--appear to be launching such attacks against Apple users.

Another Jobs decision that's had strong security upsides has been Apple's walled-garden approach to distributing applications for its iOS (iPhone, iPod Touch, iPad) devices. Namely, only applications from the Apple App Store can be installed on said devices (at least without jailbreaking them). But before developers can place their applications in the App Store, first they get vetted, and then each version of their application gets vetted, to ensure that it meets security standards, including doing what it says it does. The result has been a smartphone ecosystem in which users are at very low risk of being exploited via malicious applications.

Meanwhile, for users of Apple's biggest competitor, Android, instead of seeing a walled garden, it's arguably more of a jungle, as they can install any application from any source. Google also doesn't screen applications before offering them for sale. As a result, Trojan applications sometimes even end up in the official Android Market, requiring Google to expunge them, and occasionally even use its "kill switch" to remove especially malicious ones from devices.

Google makes the operating system, but doesn't control the Android smartphone ecosystem. Apple, of course, has taken the opposite approach, and it's notable that third parties are stepping forward to provide Android users with a more Apple-like application vetting and distribution system, such as the Amazon Appstore for Android. Of course, Apple and Google's respective approaches have their own pros, cons, and tradeoffs--not least of which is cost. But Apple iOS, for people willing to buy into its walled-garden approach, sees few exploits. Attackers seem to favor the anything-goes approach of Android, not least because it makes distributing malicious applications much easier.

How much of that iOS versus Android--or OS X versus Windows--security equation has had to do with Apple's design, ecosystem, market share, or luck? Regardless of the answer, as people celebrate what was Jobs' rare genius at bringing highly usable and desirable products to market, don't forget the security aspect of that equation, and the positive contribution to form and function offered by not having to deal with the latest malware outbreak or targeted exploit.

Security professionals often view compliance as a burden, but it doesn't have to be that way. In this report, we show the security team how to partner with the compliance pros. Download the report here. (Free registration required.)


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
10/7/2011 | 1:46:58 AM
re: Steve Jobs And Tech Security
Please feel free to light a virtual candle or send virtual flowers for Steve at this memorial website - http://memorialmatters.com/mem...
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-11
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging. This vulnerability could allow an unauthenticated remote attacker to perform Web administration actions with the privileged ...
PUBLISHED: 2020-08-11
An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible f...
PUBLISHED: 2020-08-11
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
PUBLISHED: 2020-08-11
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152225183
PUBLISHED: 2020-08-11
The Temi application 1.3.3 through 1.3.7931 for Android has hard-coded credentials.