Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Ex-NSA security bod fanboi: Apple Macs are wide open to malware
The Register ^ | 5/8/15 | John Leyden

Posted on 05/09/2015 6:10:00 PM PDT by Enlightened1

'I love Apple products, I just wish they were secure'

A former NSA staffer turned security researcher is warning that bypassing typical OS X security tools is trivial.

Patrick Wardle, a former NSA staffer and NASA intern who now heads up research at crowd-sourced security intelligence firm Synack, found that Apple's defensive Gatekeeper technology can be bypassed allowing unsigned code to run. Apple's Gatekeeper utility is pre-installed in Mac OS X PCs and used to verify code. The tool is designed so that by default it will only allow signed code to run or, depending on settings, only packages from the Mac App Store.

Apple's built-in mechanisms - Gatekeeper, XProtect anti-malware, sandboxing and kernel code-signing requirements - are "easy to get around" and "trivially exploitable", according to Wardle.

Wardle said he worked closely with Apple's internal security teams describing them as "responsive" while noting the wider consumer electronics firm had yet to embrace a culture where “comprehensive security is baked into their OS X systems" from the onset. By contrast to OS X, iOS has solid security baked in, according to Wardle.

A bug bounty from Apple - along the lines of schemes introduced by Google, Microsoft and many others - would be beneficial, according to Wardle whose firm Synack would stand to benefit from such a scheme. "Google products have themselves, become more secure because of bug bounties," Wardle said. "Introducing them seems to be a no brainer."

(Excerpt) Read more at theregister.co.uk ...


TOPICS:
KEYWORDS: apple; macs; malware; security

1 posted on 05/09/2015 6:10:00 PM PDT by Enlightened1
[ Post Reply | Private Reply | View Replies]

To: Enlightened1

Linux mint, fast and secure


2 posted on 05/09/2015 6:11:14 PM PDT by bicyclerepair (Ft. Lauderdale FL (zombie land). TERM LIMITS ... TERM LIMITS)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1

Sure, but they have built-in Gaydar.


3 posted on 05/09/2015 6:15:48 PM PDT by jjotto ("Ya could look it up!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1

So, kwai Chang..

http://www.freerepublic.com/focus/f-chat/3262821/posts

“It Appears There Are Hijacked Freeper Accounts”

Has you find more of these account and why not show to public?

Why you so quiet on this?


4 posted on 05/09/2015 6:19:09 PM PDT by humblegunner (NOW with even more AWESOMENESS)
[ Post Reply | Private Reply | To 1 | View Replies]

To: humblegunner

You’re not humblegunner. humblegunner doesn’t post stuff like this.

I think the humblegunner account has been hacked!!!


5 posted on 05/09/2015 7:36:29 PM PDT by Nervous Tick (There is no "allah" but satan, and mohammed was his demon-possessed tool.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Enlightened1; ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; ...
An Ex-NSA security claims Apple Macs are wide open to malware . . . but from my reading of his claims, they are exactly the same we've been hearing from him for some time: Macs are insecure because someone could do this:

"Up until recently all Mac security software packages downloaded over unencrypted http connections, relying on Garekeeper for code verification. Because Wardle uncovered a way to bypass Gatekeeper, this opens the door to man-in-the-middle or other attacks.

"More advanced attackers, such as nation states, would be able to see a download in progress before injecting code into legitimate downloads,"


Wardle found that users could turn off the signed protections in OS X (actually a feature of Gatekeeper to allow users to not be limited to the Apple Mac App Store) to download any app they wanted. . . oh, the horrors of users choice. . . which he thinks should be prevented!

Wardle's complaints were covered in a previously posted article on FR last month when he made the same complaints before the RSA Conference in San Francisco. . . and roundly criticized there by other computer security experts. Wardle did find another way to do the Rootpipe, not the same as the original, which was extremely difficult to exploit in the first place, requiring physical possession of the computer as does Wardle's later vulnerability. Apple has closed that one too. PING!


Apple Security Ping!

If you want on or off the Mac Ping List, Freepmail me.

The latest Freepathon is rushing to the wire, so let's put it over the top! I challenge the members of the Apple ping list to each donate at least $10 each to the latest Freepathon. I HAVE donated $100. Many members of the Apple Ping list are already rising to the challenge. Join them. Let's show the power of the Apple Ping list in supporting Freerepublic!

If you have ordered an Apple Watch,
MAKE A DONATION TO THE FREEPATHON!

6 posted on 05/09/2015 8:39:52 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: humblegunner

PROVE YOUR IDENTITY.

WHAT’S THE PASSPHRASE??


7 posted on 05/09/2015 9:46:25 PM PDT by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Enlightened1

But Apple malware has exquisite bevelled edges and handsome filigree work. The look and feel is impeccable. Every homo wants some.


8 posted on 05/09/2015 10:11:06 PM PDT by Ethan Clive Osgoode (<<== Click here to learn about Evolution!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nervous Tick; martin_fierro
"I think the humblegunner account has been hacked!!!"

No way you could have found us out!
We have taken great pains to cleverly disguise our takeover of these FReeper accounts using the latest in stealth pirating technology.

Why, we even have a brand new state-of-the-art Interociter shipped here from Metaluna and hand assembled by Gunner and myself!


9 posted on 05/09/2015 11:46:50 PM PDT by shibumi ("Walk Through the Fire, Fly Through the Smoke")
[ Post Reply | Private Reply | To 5 | View Replies]

To: martin_fierro
Who is Jim Thompson
10 posted on 05/09/2015 11:56:28 PM PDT by BlueDragon
[ Post Reply | Private Reply | To 7 | View Replies]

To: martin_fierro
ʇɐp oɥʍ ʎɐs oɥʍ ʇɐp oɥʍ

11 posted on 05/10/2015 12:06:53 AM PDT by BlueDragon (she was classy. but did the rug match the drapes)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker
Well it seems his software is just as bad. The only way to run his software is to change the Security settings in the System Preferences.

So he is trying to get you to do exactly what he claims is the problem. Downloading unauthorized software.

12 posted on 05/10/2015 10:04:00 AM PDT by amigatec (2 Thess 2:11 And for this cause God shall send them strong delusion, that they should believe a lie:)
[ Post Reply | Private Reply | To 6 | View Replies]

To: amigatec
So he is trying to get you to do exactly what he claims is the problem. Downloading unauthorized software.

BINGO!

13 posted on 05/10/2015 12:00:37 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 12 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson