Posted on 12/20/2006 2:49:52 AM PST by Swordmaker
Following a number of attacks against OS X in 2006, Mac users are finally getting the message that they are not immune, according to an IT security manager responsible for over 5,000 Apple systems.
Just over a year ago, Mark Borrie from the University of Otago in New Zealand, said that Apple users were their own worst enemy when it came to security, because they considered themselves immune from attack.
However, since that time Apple has been the subject of much debate as researchers found the first Mac-targeting malware samples and discovered weaknesses in the platforms' AirPort wireless network system.
Borrie claimed that this new focus on OS X has already increased the level of awareness amongst Apple users.
"That was part of the issue I had last year...with Mac OS you can get hacked and you can get taken over--that message is slowly getting through to the key people," Borrie told ZDNet Australia in a telephone interview on Monday.
Borrie explained that he does not expect to see OS X plagued by spyware and replicating viruses that infest Windows systems, but he believes there will be more Mac-related malware.
"Keyloggers are all PC based but there is no reason why those keyloggers couldn't be written for Macs--but I haven't seen any around yet," he said.
Macs used to control Windows bots?
Borrie said that during the past year he has seen Apple-based systems hacked and then used to control bots of Trojan-infected Windows PCs.
He explained that the hacked Mac systems were left vulnerable because users had employed weak passwords or misconfigured their services.
"We are seeing Macintosh systems being targeted for hands-on hacking as opposed to worms...In one situation, Macs were being used as a bot net channel in IRC--they were taking over PCs," said Borrie, who warned that this kind of activity is difficult to recognise because it does not generate much network traffic.
"The problems can be there for months. If somebody breaks into a machine all they are doing is a bit of IRC activity. There is not a lot to trigger a warning. Your traffic loads and processing loads do not increase dramatically," added Borrie.
One proof of concept that had no payload, that never left the laboratory, and had no means of propagating does not "samples" make.
"Keyloggers are all PC based but there is no reason why those keyloggers couldn't be written for Macs--but I haven't seen any around yet," he said.
Hasn't seen any around yet... and they build a FUD article on this???
". . . Macintosh systems being targeted for hands-on hacking as opposed to worms . . ."
Local exploits? Yep. You have access to a weakly passworded computer and you can make it do computer things... Whow. I'm underwhelmed.
If you want on or off the Mac Ping List, Freepmail me.
^
Is the writer ignorant of the difference between a system with security issues and a user setting a weak password?
WinXP does not have, or breaks the layers of abstraction, which makes for exponentially more security holes.
Authentication and security are two different things.
what program would you use to customize labels and use with your address book?... is there a general Mac freeper thread for these kind of questions. You all have been helpful in the past.
If you select print from the Address Book app, you will find that you have options of printing envelopes, labels, lists or pocket address book. You can print to Avery labels by product number, to a Dymo label printer, or custom.
To select the addresses you create a custom group in the Address book and add the names you want to send to. You select that group to print.
is there a general Mac freeper thread for these kind of questions.
There is a general Tech Help that you can post your question as a vanity in Chat and there is a Tech Ping List which includes Mac users. The guy who runs the list (N3WBI3?) will Ping the members to come and answer.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.