Posted on 05/10/2006 5:16:08 PM PDT by Swordmaker
"Organizations are looking to network access control solutions that leverage endpoint intelligence to deliver continuous protection against worms, spyware, malicious behavior and endpoint configurations that slip out of compliance," said Eric Ogren, security analyst at the Enterprise Security Group.
Mac users are facing an onslaught of security threats -- and reacting to the malware is no longer considered a good strategy. Taking proactive measures agains phishers, spyware, ID thieves and other Web threats, like downloadable rootkits which infest operating systems, is the new norm.
During a conference call with reporters, experts affiliated with the SANS Institute indicated that there has in recent weeks been a "surge" in attacks on the Apple (Nasdaq: AAPL) OS X platform. The growth in Mac vulnerabilities, according to Alan Paller, director of research at SANS, comes as there is a decline in the critical vulnerabilities found in Windows services.
Browsers Vulnerable
Part of the problem lies in the Web browser that many Mac users rely upon -- Internet Explorer. "I think it is almost time to rename Internet Explorer the 'Internet Exploiter,'" said Rohit Dhamankar, manager of security research at TippingPoint, a division of the networking firm, 3Com (Nasdaq: COMS) . "The trend of more vulnerabilities being discovered has been increasing during the last six months."
Another problem lies in the Firefox 1.5.0.2 browser, which is providing native support for Macs with Intel (Nasdaq: INTC) core processors. Last month, the Mozilla Foundation had to release an update of its Firefox browser, just hours after reports of critical vulnerabilities appeared in the media.
This is prompting a call in the industry for security solutions that can respond to so-called "zero day" threats -- that is, threats that appear, all across the Internet, without warning, and without time for IT departments to respond properly.
Traditional Models 'Ineffective'
"The traditional models are proving to be ineffective in defending against unknown, zero-day and stealthy attacks like rootkits," said Jeff Kessler, chief executive officer of Chicago-based Ktech Consulting, an IT security firm. "The primary problem is time. Consultants are called in to run scans and updates, which wastes hours."
Anti-virus solutions commonly deployed by companies -- small and large enterprises alike -- are not as effective as they once were in shutting down the malware attackers. "Critical systems cannot effectively be protected against threats," said Timothy Eades, senior vice president of sales at Sana Security, an IT security firm, based in San Mateo, Calif.
Several levels of security are now needed to protect desktop computers, or networks with a number of Macs, from intruders bearing rootkits. Software has been developed that can scan for rootkits and keystroke loggers without having to scan the system -- the reasoning being that these stealthy software programs can evade detection through scanning. So-called "behavior heuristics" are embedded in the software to detect and remove the malware -- before it can harm the computer at the kernel level.
Too Many Opportunities
"Hackers have numerous tools that can exploit attack vectors into organizations today," Paul Proctor, research vice president at Gartner , said. "Businesses need to develop a defense-in-depth strategy that combines pro-active security processes with tools and techniques to protect their networks at a reasonable level."
This is an area that Gartner, in particular, is watching. The company last week named Derby, England-based Prevx, a developer of intrusion prevention technologies, as a "2006 Cool Vendor." The reason -- the company has developed a real-time database of information about the emergence, propagation, genetics and behavior of software used by its user community of 200,000 computers. A free trial version of the software is available online via the company's Web site.
"The technology detects malicious code based on what it does, not on what it is," said Gartner's March 2006 Privacy and Security Report. "One behavioral signature can stop entire classes of attacks, while traditional anti-virus products would require many signature updates for similar protection."
Often, on Macs and PCs, with conventional anti-virus technology, the anti-virus scans are not revealing the presence of the malware, because not all variants of active virus signatures are being detected, Gartner said in its report.
Network access control is the new buzzword, replacing mere anti-virus protection for IT organizations. "Organizations are looking to network access control solutions that leverage endpoint intelligence to deliver continuous protection against worms, spyware, malicious behavior and endpoint configurations that slip out of compliance," said Eric Ogren, security analyst at the Enterprise Security Group, an IT research consultancy.
Part of the problem lies in the Web browser that many Mac users rely upon -- Internet Explorer. "I think it is almost time to rename Internet Explorer the 'Internet Exploiter,'" said Rohit Dhamankar, manager of security research at TippingPoint, a division of the networking firm, 3Com (Nasdaq: COMS) . "The trend of more vulnerabilities being discovered has been increasing during the last six months."
Hilarious... I don't know of ANY OS X users that are relying on "Internet Explorer" for anything... it hasn't been updated since Noah got off the Ark.
MacDailyNews' response to this FUD article follows:
MacDailyNews Take: We're just going to stop the Koprowski BS Express right in its tracks at this random point of ridiculousness. Our stats show the browsers in use to access MacDailyNews (which obviously receives a high concentration of Mac users) in the month of April 2006 as follows: 63% for Safari / Safari RSS / "Mozilla Compatible Agent," 13% for Firefox, 6% for NetNewsWire, 6% for Internet Explorer, 3% for MacReporter, 0.77% for Camino, etc. You get the point: even with a large group of Mac users stuck on Windows machines at work and using IE, our stats show just 6% accessing our site via IE (about which we're extremely happy, BTW), so Koprowski's statement that "many Mac users rely upon Internet Explorer" is as wrong as wrong gets - just like the rest of the FUD contained in his "report." What's Koprowski going to do next, an exposé on how it's likely going to pour rain every day in Phoenix according to Arizona-based umbrella manufacturers and retailers?
Even that 6% for Internet Explorer is questionable... I often set my Safari Agent to masquerade as a PC Internet Explorer 6.0 on the web to allow it to go to sites that use some of Microsoft's proprietary junk coding. I know several other Mac/Safari users who do the same. The app that gathers the statistics will see our Safari using Macs as Internet Explorer using PCs... ;^)>
For a much more accurate take on the Mac security front, try this article or this one.
If you want on or off the Mac Ping List, Freepmail me.
Bingo... we hava winna!
Ummmm...apple pie!....num num...
iCab; Camino is also pretty nice.
I use Safari almost exclusively, except for running Firefox simultaneously so I can browse uninterrupted when one browser is tied up.
I use tabs like a mad man, and a single browse session could produce up to 6 windows in each browser with tabs running off the edge in each.
Internet Explorer? Heck, I only open it up from time to time so I can access one of the very few web sites on the internet that uses sub par coding, and even then - it has been a year or two since I've had to use Explorer for even that.
FUD is absolutely right... I wonder how much Microsoft stock some of these journalists own...
I thought Internet Explorer was no longer supported for Macs as of January of this year. This is an insane article.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.