Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

An Apple Fanboi Writing Malware For Mac OSX

50%
50%

At the Dark Reading News Desk at Black Hat Aug. 5, Patrick Wardle, director of research for Synack and Apple fan, spoke to Dark Reading senior editor Sara Peters about his session "Writing Bad @$$ Malware for OS X," why he chose to write exploits for an OS he loves, how he circumvented its best protections, and what Apple has been like to work with on vulnerability disclosure.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
8/19/2015 | 12:51:53 PM
Re: Apple vs Windows
It depends on what your prefer. Yes, in the laptop realm macs will tend to be more expensive but it depends on what you are going for. Windows is the software while Apple is responsible for both the hardware and software even though their hardware is from other 3rd parties. Hence, why many different companies sell windows computers. I go back and forth. I prefer Apple for the aesthetic hardware. But prefer Windows for the OS....Hence why bootcamp is perfect for me...Running Windows OS on Apple hardware. Apples to apples, you are right computers with Windows tend to be less costly but it all comes down to the manufacturing company. For example look at Alienware. Their windows PC's are expensive as well and could defintely compare with Apple pricing.
saiopen
50%
50%
saiopen,
User Rank: Apprentice
8/19/2015 | 4:30:05 AM
Re: Apple vs Windows
i prefer windows as its good in cost
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
8/18/2015 | 2:30:09 PM
Apple vs Windows
A very good analogy that I've heard used between Mac and Windows in terms of being exploitable and their security posture is that Mac is an unlocked barn in the middle of nowhere, less of a target and therefore less precaution is taken to secure. While Windows is in a high crime, city-esque populated area. All the windows and doors are locked and barred but it is constantly trying to be exploited and therefore new means and methods are being devised to do so. As the video states, it very heavily has to do with size of target. However, this does not mean that mac should be lax in any way shape or form.
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9667
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to to plant custom binaries and execute them with System permissions. Exploitation of this issue requires user interaction.
CVE-2020-9668
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Improper Access control vulnerability when handling symbolic links. An unauthenticated attacker could exploit this to elevate privileges in the context of the current user.
CVE-2020-9681
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction.
CVE-2021-26830
PUBLISHED: 2021-04-16
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
CVE-2021-29443
PUBLISHED: 2021-04-16
jose is an npm library providing a number of cryptographic operations. In vulnerable versions AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be throw...