backtop


Print 62 comment(s) - last by Silent-Ninja.. on May 17 at 6:04 PM


Looks like "PC" isn't the only one to have malware woes.  (Source: Apple)
Kaspersky recently published an analysis indicating that the Cupertino company was ten years behind Microsoft

Things haven't been pretty for Apple, Inc. (AAPL) of late as its seen a number of high-profile security embarassments surrounding its Mac personal computers.  Most recently OS X 10.7.2 Lion was caught dumping passwords in plaintext, thanks to some sloppy programming by an Apple engineer.  Before that, Apple suffered a Trojan infection of Conficker proportions (between 1 and 2 percent of Macs -- or roughly 600,000 machines were estimated to be infected) and was caught telling its technicians to lie about another wide-spread piece of malware, a fake antivirus program dubbed "MacDefender".

I. Kaspersky Recruited to Remedy Woeful OS X Security

Famed OS X hacker Charlie Miller once told a security blog, "Mac OS X is like living in a farmhouse in the country with no locks, and Windows is living in a house with bars on the windows in the bad part of town."

Today the developer -- who Apple recently gave the boot from its developer program for revealing it flawed security -- has a softer perspective on the topic, stating to Kaspersky's threat post blog, "
It's always been the easiest to exploit and now it's to the point that it's not that easy anymore.  OS X has always been way behind on security, but now it's more or less comparable [to Windows]. Once you have ASLR and DEP and some sandboxing, that's all anyone has."

Still that wasn't enough to keep Kaspersky from delivering a scathing perspective on Apple's security, which it estimates to be a full decade behind Microsoft Corp. (MSFT).

In the aftermath of that assessment, Kaspersky's chief technology officer,
Nikolai Grebennikov has been quoted in a Computing.co.uk interview as saying that Apple has approached it desparate for security support.  The top security firm reportedly agreed and is in the midst of a likely lucrative assessment of the OS X code-base.

Kaspersky's criticism and Mr. Miller's praise may at first seem oddly divergent commentaries.  But in reality much of Apple's recent security flaws have come down to its insistence on redistributing third-party updates, coupled with a handful of careless programming errors.  Apple does not allow third-parties like Oracle Corp. (ORCL) the ability to directly patch their Mac OS platforms, such as Java.  While Apple views this as a security "feature" it has become more of a nightmare of late, as Macs are being exploited via gaping Java or Flash holes that were long ago patched in Windows.

Not surprisingly, Mr. Grebennikov indicates that much of Kaspersky's early advice to Apple revolves around letting third parties update their own platforms -- or at least assume a more responsible pace of mandatory updates.  Comments the security chief:

Mac OS is really vulnerable and Apple recently invited us to improve its security. We've begun an analysis of its vulnerabilities, and the malware targeting it.

Our first investigations show Apple doesn't pay enough attention to security. For example, Oracle closed a vulnerability in Java, which was a target for a major botnet several months ago.

Apple blocked Oracle from updating Java on Mac OS, and they perform all the updates themselves. They only released the patch a few weeks ago – two or three months after the Oracle patch. That's far too long.

II. iOS Malware Expected to Soon Become Serious

Kaspersky  indicates that Apple was fortunate to seek help when it did.  Mr. Grebennikov estimates that malware will soon be targeting Apple's coveted iOS platform, which shares much in the way of security -- or lack thereof -- with OS X.  He comments, "Our experience tells us that in the near future, perhaps in a year or so, we will see the first malware targeting iOS."

Thus far a couple of harmless Trojans and worms have struck iOS, but have almost exclusively attacked users of jailbroken iPhones or iPads.  Apple does not care about these infections as it does not consider jailbroken device users to be part of its user base.  Jailbreaking, or removing Apple's control over what apps can be run, voids users' warranties.

iPhone 4 fan
Kaspersky expects malicious hackers to target Apple's iOS mobile platform.
[Image Source: Toru Yamanaka/AFP/Getty Images]

Apple has long maintained an arrogant air from a marketing perspective, claiming its machines were impervious to malware or hacking, while portraying machines running Microsoft Windows operating system as "buggy" and "virus prone".  The company is surely eager to prevent the public from wising up to the reality that it may actually be well behind Microsoft in terms of system security.

Source: Computing.co.uk



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: That's Convenient
By Pirks on 5/15/2012 10:08:53 PM , Rating: 2
I don't heed warnings from sleazy "businessmen" selling feces in a flashy packaging. I only heed real life facts. So, when I see the real life mass infections on iOS - THEN I'll bother. For now, if you excuse me, I'll treat "Kapersky"'s "gimme money!" warnings for what they're worth.


RE: That's Convenient
By Trisped on 5/16/2012 1:37:07 PM , Rating: 2
quote:
I only heed real life facts.
Your religion is showing.


RE: That's Convenient
By Pirks on 5/16/2012 1:40:44 PM , Rating: 2
Your avoidance of facts (absence of mass infections on iOS despite humongous number of users) is telling.


RE: That's Convenient
By Trisped on 5/16/2012 7:07:54 PM , Rating: 2
quote:
Your avoidance of facts (absence of mass infections on iOS despite humongous number of users) is telling.
Where did I imply I was avoiding the fact that iOS has not had a "mass infection"? Just because something has not happened does not make it impossible, only lowers the probability. The real truth is that you are avoiding the facts, that iOS is the victim of multiple mass infections. Just because most of those infections were the result of knowing and willful user action does not change the fact.

The fact is that security bugs which can be exploited to grant root access have been discovered on the device.
There have been several different instances of exploitable bugs reported for this device.
It has taken Apple anywhere from a few weeks to a few months to patch these exploits once they have been reported.

So yes, it is only a matter of time before there is a mass iOS infection with malicious intent.
If you don't like the fact , then that is your problem.


"If they're going to pirate somebody, we want it to be us rather than somebody else." -- Microsoft Business Group President Jeff Raikes














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki