Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 24

Strict Standards: Non-static method modFlexiCustomCode::parsePHPviaFile() should not be called statically in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 54

Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/components/com_grid/GridBuilder.php on line 29

Apple scored unforgettable hits against Microsoft with its Mac vs. PC ads, which anthropomorphized Windows as a sneezing, miserable office worker.  

Security experts always knew that the campaign was a clever bit of marketing fluff, one that allowed Apple to capitalize on Microsoft’s painful, years-long security revamp.

The landscape is changing, however. Apple’s market share of desktop computers is nearing 17 percent. OS X, Apple’s operating system, is popular with consumers and enterprises now, making it a more interesting target for hackers.

A report to be released on Thursday by the security company Bit9 + Carbon Black shows that more malware has been found this year for OS X than in the last five years combined.

The company found 948 unique samples of malware this year compared to just 180 between 2010 and last year.

Although the increase is large, the malware isn’t very sophisticated and is easy to remove, security experts say.

More than half of the malware found this year was aimed at forcing people to view advertisements, a class of annoyances known as adware. Also, infections were mostly dependent on users making poor decisions, such as downloading what should be recognized as questionable software.

The jump in OS X malware also still pales in comparison to Windows. 

“If you put all of the Mac malware that we’ve seen, and you combine those numbers for the history of OS X, basically it is less by a significant amount than the amount of Windows malware you will see in an hour,” said Rich Mogull, an analyst with Securiosis in Phoenix, Arizona.

Apple, which usually does not comment on security issues, declined to comment.

Over the last several years, including in the latest version of OS X, El Capitan, Apple has been hardening keys parts of the operating system to make it much harder for attackers to run rogue code.

Still, software is fallible, and even well-resourced companies such as Apple make coding mistakes that could provide opportunities. Also, OS X is attracting more attention from highly skilled security experts, who have found ways around some of its recent defenses.

Tricking the Gatekeeper  

Patrick Wardle, director of research with the company Synack, has extensively studied Apple’s Gatekeeper, a key defense in preventing certain kinds of applications from installing.

Gatekeeper, introduced in 2012, checks if applications have a digital signature and will block those that don’t have one approved by Apple.

Wardle found a way around Gatekeeper earlier this year, and Apple patched the issue. But after studying it for a few days, he bypassed Gatekeeper again. 

“Instead of them implementing a more generic patch or generic fix, they kind of did just what was the bare minimum,” Wardle said. “That’s a little worrisome.”

His latest findings were presented two weeks ago at the Virus Bulletin security conference in Prague, and Apple has been notified.

apple gatekeeperPatrick Wardle/Synack

Patrick Wardle of Synack has found two issues in Apple’s Gatekeeper, which is designed to stop certain applications from installing.

Patrick Wardle/Synac

 Wardle talks to Apple’s security team regularly about bugs he finds in OS X. They are “sharp guys,” he says, but they may be fighting a company culture where usability in many cases trumps security.

Locking down OS X’s core

Apple introduced a new defense in OS X El Capitan called System Integrity Protection (SIP), which is makes it a lot harder for malware writers to touch critical OS files.

SIP blocks the most powerful kind of access to the operating system, known as “root.” That access is usually only prevented by a single password set by the Mac’s user, who has administrative privileges.

If that password is compromised, an attacker with root access can disable other security protections, posing a great risk.

SIP greatly reduces the opportunity for malware writers to put something deeply rooted in OS X,  said Rich Trouton, a Mac systems administrator in Middletown, Maryland, who writes the Der Flounder blog.

“People look at it and go ‘Apple’s not finding a bunch of malware,’” Trouton said. “And that’s true at the moment, but the reason for that is that Apple’s put a lot work into making OS X a less appealing target.”

However, “who knows what the future may bring,” he said.

More eyes on the code

Another interesting fact about OS X this year: about four times more software vulnerabilities have been disclosed than in past years.

A list shows 276 flaws have been found this year, which is about four times higher than the average number found annually over the last 15 years, said Claud Xiao, a security researcher with Palo Alto Networks.

“It’s a huge increase,” Xiao said. “This year, more and more researchers are focused on how to bypass security mechanisms or how to get code to execute remotely.”

Malware writers also seemed more tuned into using vulnerabilities to infect OS X. Xiao said that in three cases this year, malware or adware used disclosed vulnerabilities to get onto systems.

Mac malware and adware programs have typically relied on tricking users into installing them rather than exploiting vulnerabilities. Apple’s built-in AV product, called XProtect, is regularly updated to block nuisances like adware.

But Wardle said Apple has fixed more than 100 security bugs in El Capitan so far, which means there are likely other opportunities to get malware onto a machine.

“I’m sure more advanced adversaries could find remote vulnerabilities if they needed to,” he said.

Read more http://www.macworld.com/article/2993302/security/is-apples-security-honeymoon-on-os-x-ending.html#tk.rss_all


Strict Standards: Only variables should be assigned by reference in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 24

Strict Standards: Non-static method modFlexiCustomCode::parsePHPviaFile() should not be called statically in /home/noahjames7/public_html/modules/mod_flexi_customcode/tmpl/default.php on line 54

Find out more by searching for it!

Custom Search







Strict Standards: Non-static method modBtFloaterHelper::fetchHead() should not be called statically in /home/noahjames7/public_html/modules/mod_bt_floater/mod_bt_floater.php on line 21