Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
12.2K views | +2 today
Follow
Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

iOS, Mac OS X, WatchOS : le Patch Tuesday made in Apple | CyberSecurity | CyberHygiene | Updates

iOS, Mac OS X, WatchOS : le Patch Tuesday made in Apple | CyberSecurity | CyberHygiene | Updates | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Après Microsoft qui a publié un Patch Tuesday bien fourni en correctifs critiques, c’est au tour d’Apple de mener un grande vague de mises à jour de sécurité sur plusieurs produits. Les OS de la firme de Cupertino sont bien évidement aux premières loges.

Différentes versions de Mac OS X sont concernées : OS X El Capitan 10.11.2, OS X Yosemite 10.10.5, et Mavericks 10.9.5. Au total, la Security Update 2015-008 corrige 54 vulnérabilités dans des services et des composants tel qu’App Sandbox, Bluetooth, Compression, Configuration Profiles, CoreGraphics, CoreMedia Playback, EFI, File Bookmark, Hypervisor, ImageIO, Intel Graphics Driver, IOAcceleratorFamily, IOHIDFamily, IOKit SCSI, Kernel, Keychain Access, OpenGL, Sandbox, Security, etc. A noter que la moitié des failles découvertes sont critiques, car elles peuvent permettre à des pirates d’exécuter du code arbitraire à distance.


Learn more / Mehr erfahren / En savoir plus :


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Patch+Tuesday+made+in+Apple


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Après Microsoft qui a publié un Patch Tuesday bien fourni en correctifs critiques, c’est au tour d’Apple de mener un grande vague de mises à jour de sécurité sur plusieurs produits. Les OS de la firme de Cupertino sont bien évidement aux premières loges.

Différentes versions de Mac OS X sont concernées : OS X El Capitan 10.11.2, OS X Yosemite 10.10.5, et Mavericks 10.9.5. Au total, la Security Update 2015-008 corrige 54 vulnérabilités dans des services et des composants tel qu’App Sandbox, Bluetooth, Compression, Configuration Profiles, CoreGraphics, CoreMedia Playback, EFI, File Bookmark, Hypervisor, ImageIO, Intel Graphics Driver, IOAcceleratorFamily, IOHIDFamily, IOKit SCSI, Kernel, Keychain Access, OpenGL, Sandbox, Security, etc. A noter que la moitié des failles découvertes sont critiques, car elles peuvent permettre à des pirates d’exécuter du code arbitraire à distance.


Learn more / Mehr erfahren / En savoir plus :


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Patch+Tuesday+made+in+Apple


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac OS X Malware Soars in 2015

Mac OS X Malware Soars in 2015 | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
“For years, Mac users have watched their PC-using counterparts struggle with cyber-attacks, while enjoying the relative immunity that their hardware provides from malware. This view is becoming increasingly outdated; our research shows that Mac users should be just as worried,” argued Bit9 + Carbon Black Emea MD, David Flower.

“With 45 per cent of businesses now offering Macs as an option to staff, our research should be seen as a timely reminder that every device on the network is a potential target—businesses can’t just rely on a clearly outdated perception of invulnerability.”


Mac malware is set to accelerate over the coming months after having its most prolific year ever so far in 2015, according to new research from endpoint security firm Bit9 + Carbon Black.


After an analysis of the year so far, the vendor concluded that five times more Mac malware appeared in 2015 than the previous five years combined.  


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
For years, Mac users have watched their PC-using counterparts struggle with cyber-attacks, while enjoying the relative immunity that their hardware provides from malware. This view is becoming increasingly outdated; our research shows that Mac users should be just as worried,” argued Bit9 + Carbon Black Emea MD, David Flower.

“With 45 per cent of businesses now offering Macs as an option to staff, our research should be seen as a timely reminder that every device on the network is a potential target—businesses can’t just rely on a clearly outdated perception of invulnerability.”


Mac malware is set to accelerate over the coming months after having its most prolific year ever so far in 2015, according to new research from endpoint security firm Bit9 + Carbon Black.


After an analysis of the year so far, the vendor concluded that five times more Mac malware appeared in 2015 than the previous five years combined.  


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Votre Mac peut être piraté par une simple photo | Nobody Is Perfect | CyberSecurity | Apple

Votre Mac peut être piraté par une simple photo | Nobody Is Perfect | CyberSecurity | Apple | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
SÉCURITÉ - On dit souvent qu'un Mac est plus sécurisé qu'un ordinateur sous Windows. Sauf qu'il n'en est rien: en 2014, le nombre de failles de sécurité découvertes sur Mac OS était bien supérieur à celles découvertes sur le système d'exploitation de Microsoft. Et la dernière en date accessible aux pirates fait froid dans le dos: avec une simple photo, il est possible de se faire voler tous ses mots de passe.

C'est en effet ce qu'ont découvert deux développeurs, Antoine Vincent Jebara et Raja Rahbani, rapporte 01Net. Le fautif? Keychain, le gestionnaire de mot de passe de Mac OS X. C'est lors de tests sur leur propre logiciel de gestion de mots de passe, MyKi, qu'ils se sont aperçus du problème.

En tapant quelques lignes de commande dans l'opérateur de commandes, il est possible d'accéder à toutes les informations stockées par Keychain... sans avoir besoin de rentrer le mot de passe principal. En effet, seule une petite fenêtre s'affiche, qui demande à l'utilisateur de cliquer sur "autoriser".


En savoir plus / Mehr erfahren / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
SÉCURITÉ - On dit souvent qu'un Mac est plus sécurisé qu'un ordinateur sous Windows. Sauf qu'il n'en est rien: en 2014, le nombre de failles de sécurité découvertes sur Mac OS était bien supérieur à celles découvertes sur le système d'exploitation de Microsoft. Et la dernière en date accessible aux pirates fait froid dans le dos: avec une simple photo, il est possible de se faire voler tous ses mots de passe.

C'est en effet ce qu'ont découvert deux développeurs, Antoine Vincent Jebara et Raja Rahbani, rapporte 01Net. Le fautif? Keychain, le gestionnaire de mot de passe de Mac OS X. C'est lors de tests sur leur propre logiciel de gestion de mots de passe, MyKi, qu'ils se sont aperçus du problème.

En tapant quelques lignes de commande dans l'opérateur de commandes, il est possible d'accéder à toutes les informations stockées par Keychain... sans avoir besoin de rentrer le mot de passe principal. En effet, seule une petite fenêtre s'affiche, qui demande à l'utilisateur de cliquer sur "autoriser".


En savoir plus / Mehr erfahren / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Sécurité : des failles dans iCloud, XProtect et Gatekeeper | Nobody Is Perfect | ICT | eSkills

Sécurité : des failles dans iCloud, XProtect et Gatekeeper | Nobody Is Perfect | ICT | eSkills | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Les conférences Black Hat battent leur plein à Las Vegas, et les chercheurs en sécurité informatique qui se pressent durant ce raout n’ont pas manqué de pointer du doigt les vulnérabilités qui touchent les produits d’Apple : Thunderstrike 2 et dyld (qui serabouché avec OS X 10.10.5) ont occupé les gazettes cette semaine, tandis que d’autres failles sont annoncées.


Patrick Wardle, directeur de recherche pour Synack, a levé le voile sur plusieurs faiblesses d’OS X. Gatekeeper tout d’abord : ce système qui, une fois activé, n’installe que les logiciels dument signés peut être contourné. En utilisant des bibliothèques dynamiques qui injectent du code vérolé dans des applications pourtant identifiées comme sûres, il est possible d’infecter un Mac.


Plus généralement, il estime que développer un malware pour OS X est facile et qu’Apple devrait mettre en place une véritable stratégie pour la sécurité de ses produits, même s’il reconnait que des efforts sont faits en ce sens. La popularité toujours plus forte des Mac et des appareils iOS oblige le constructeur à en faire plus, les plateformes d’Apple étant apparues sur le radar des malandrins du code.


Image credit (posted on Facebook) <===> http://www.pcworld.com/article/2955707/security/macs-can-be-remotely-infected-with-firmware-malware-that-remains-after-reformatting.html


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike




Gust MEES's insight:

Les conférences Black Hat battent leur plein à Las Vegas, et les chercheurs en sécurité informatique qui se pressent durant ce raout n’ont pas manqué de pointer du doigt les vulnérabilités qui touchent les produits d’Apple : Thunderstrike 2 et dyld (qui serabouché avec OS X 10.10.5) ont occupé les gazettes cette semaine, tandis que d’autres failles sont annoncées.


Patrick Wardle, directeur de recherche pour Synack, a levé le voile sur plusieurs faiblesses d’OS X. Gatekeeper tout d’abord : ce système qui, une fois activé, n’installe que les logiciels dument signés peut être contourné. En utilisant des bibliothèques dynamiques qui injectent du code vérolé dans des applications pourtant identifiées comme sûres, il est possible d’infecter un Mac.


Plus généralement, il estime que développer un malware pour OS X est facile et qu’Apple devrait mettre en place une véritable stratégie pour la sécurité de ses produits, même s’il reconnait que des efforts sont faits en ce sens. La popularité toujours plus forte des Mac et des appareils iOS oblige le constructeur à en faire plus, les plateformes d’Apple étant apparues sur le radar des malandrins du code.


Image credit (posted on Facebook) <===> http://www.pcworld.com/article/2955707/security/macs-can-be-remotely-infected-with-firmware-malware-that-remains-after-reformatting.html


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac : un premier ver s'attaque aux firmwares installés, en silence

Mac : un premier ver s'attaque aux firmwares installés, en silence | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
C'est la première fois qu'une telle menace est observée chez Apple. Elle ne peut pas être détectée par les anti-virus et est difficilement patchable.


Image credit (posted on Facebook) <===> http://www.pcworld.com/article/2955707/security/macs-can-be-remotely-infected-with-firmware-malware-that-remains-after-reformatting.html


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike


Gust MEES's insight:
C'est la première fois qu'une telle menace est observée chez Apple. Elle ne peut pas être détectée par les anti-virus et est difficilement patchable.


Image credit (posted on Facebook) <===> http://www.pcworld.com/article/2955707/security/macs-can-be-remotely-infected-with-firmware-malware-that-remains-after-reformatting.html


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Deux virus s'attaquent au Mac et à sa réputation sécuritaire | Nobody Is Perfect | ICT

Deux virus s'attaquent au Mac et à sa réputation sécuritaire | Nobody Is Perfect | ICT | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Thunderstrike 2, un ver qui s’immisce au niveau firmware, et un autre bug permettant de contourner les privilèges d’utilisateurs, mettre à mal la réputation de la pomme.

Depuis des années, le Mac a toujours été perçu comme une plateforme relativement à l’abri des virus. Cette étanchéité s’explique par la combinaison de ses parts de marchés, minimes lorsqu’on les compare à celles des PC propulsés par Windows, et de la fiabilité d’OS X, qui traditionnellement comprend moins de failles de sécurité que le système d’exploitation de Microsoft.

Toutefois, la réputation des produits Apple en prend pour son rhume cette semaine, alors que deux vulnérabilités liées au Mac font les manchettes.


Si l’une demeure non exploitée pour l’instant, l’autre menace déjà la sécurité de millions d’ordinateurs.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike



Gust MEES's insight:
Thunderstrike 2, un ver qui s’immisce au niveau firmware, et un autre bug permettant de contourner les privilèges d’utilisateurs, mettre à mal la réputation de la pomme.

Depuis des années, le Mac a toujours été perçu comme une plateforme relativement à l’abri des virus. Cette étanchéité s’explique par la combinaison de ses parts de marchés, minimes lorsqu’on les compare à celles des PC propulsés par Windows, et de la fiabilité d’OS X, qui traditionnellement comprend moins de failles de sécurité que le système d’exploitation de Microsoft.

Toutefois, la réputation des produits Apple en prend pour son rhume cette semaine, alors que deux vulnérabilités liées au Mac font les manchettes.


Si l’une demeure non exploitée pour l’instant, l’autre menace déjà la sécurité de millions d’ordinateurs.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

In-the-wild attack exploits unpatched OS X zero-day flaw | Nobody Is Perfect | Apple

In-the-wild attack exploits unpatched OS X zero-day flaw | Nobody Is Perfect | Apple | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Last month, security researcher Stefan Esser published details and proof-of-concept code of a zero-day vulnerability in OS X Yosemite that could allow a hacker to easily escalate their privileges, and take complete control over Mac computers.

Esser chose not to contact Apple about the DYLD_PRINT_TO_FILE vulnerability - which remains currently unpatched in OS X Yosemite, despite it curiously being fixed in the beta version of the next iteration of OS X, El Capitan.

Now, security firm Malwarebytes has discovered an in-the-wild attack exploiting the vulnerability, where root permission is gained on the computer without a password being needed.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Last month, security researcher Stefan Esser published details and proof-of-concept code of a zero-day vulnerability in OS X Yosemite that could allow a hacker to easily escalate their privileges, and take complete control over Mac computers.

Esser chose not to contact Apple about the DYLD_PRINT_TO_FILE vulnerability - which remains currently unpatched in OS X Yosemite, despite it curiously being fixed in the beta version of the next iteration of OS X, El Capitan.

Now, security firm Malwarebytes has discovered an in-the-wild attack exploiting the vulnerability, where root permission is gained on the computer without a password being needed.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Macs can be remotely infected with firmware malware that remains after reformatting

Macs can be remotely infected with firmware malware that remains after reformatting | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Researchers created Thunderstrike 2 firmware malware that could remotely infect Apple computers and remain even if a user were to wipe the hard drive and reinstall OS X.


When companies claim their products are unhackable or invulnerable, it must be like waving a red flag in front of bulls as it practically dares security researchers to prove otherwise. Apple previously claimed that Macs were not vulnerable to the same firmware flaws that could backdoor PCs, so researchers proved they could remotely infect Macs with a firmware worm that is so tough to detect and to get rid of that they suggested it presents a toss your Mac in the trash situation.


Firmware runs when you first boot a machine; it launches the operating system. For Apple computers, the firmware is called the extensible firmware interface (EFI). Most people believe Apple products are superior when it comes to security, but the researchers want to “make it clear that any time you hear about EFI firmware attacks, it’s pretty much all x86 [computers].” Attackers need only a few seconds to remotely infect Mac firmware. Macs infected with Thunderstrike 2 would remain infected even if a user were to wipe the hard drive and reinstall the OS, as that doesn’t fix a firmware infection.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike



Gust MEES's insight:
Researchers created Thunderstrike 2 firmware malware that could remotely infect Apple computers and remain even if a user were to wipe the hard drive and reinstall OS X.


When companies claim their products are unhackable or invulnerable, it must be like waving a red flag in front of bulls as it practically dares security researchers to prove otherwise. Apple previously claimed that Macs were not vulnerable to the same firmware flaws that could backdoor PCs, so researchers proved they could remotely infect Macs with a firmware worm that is so tough to detect and to get rid of that they suggested it presents a toss your Mac in the trash situation.


Firmware runs when you first boot a machine; it launches the operating system. For Apple computers, the firmware is called the extensible firmware interface (EFI). Most people believe Apple products are superior when it comes to security, but the researchers want to “make it clear that any time you hear about EFI firmware attacks, it’s pretty much all x86 [computers].” Attackers need only a few seconds to remotely infect Mac firmware. Macs infected with Thunderstrike 2 would remain infected even if a user were to wipe the hard drive and reinstall the OS, as that doesn’t fix a firmware infection.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac OS X : une faille critique non corrigée a été découverte dans Yosemite | Apple | CyberSecurity

Mac OS X : une faille critique non corrigée a été découverte dans Yosemite | Apple | CyberSecurity | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Sale temps pour les Mac. Un chercheur en sécurité allemand a découvert une vulnérabilité dans Mac OS X 10.10 qui permet de prendre le contrôle de la machine grâce à une escalade des privilèges utilisateur.
Gust MEES's insight:

Sale temps pour les Mac. Un chercheur en sécurité allemand a découvert une vulnérabilité dans Mac OS X 10.10 qui permet de prendre le contrôle de la machine grâce à une escalade des privilèges utilisateur.


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Einzeiler beschert Adminrechte unter Mac OS X 10.10 | CyberSecurity | Apple

Einzeiler beschert Adminrechte unter Mac OS X 10.10 | CyberSecurity | Apple | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Durch eine Rechteausweitungslücke kann sich jeder Yosemite-Nutzer zum root erklären. Der Exploit ist so kurz, dass er in einen Tweet passt.





Mehr erfahren / Learn more:



Gust MEES's insight:

Durch eine Rechteausweitungslücke kann sich jeder Yosemite-Nutzer zum root erklären. Der Exploit ist so kurz, dass er in einen Tweet passt.


Mehr erfahren / Learn more:



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Security hole in MacKeeper used to shove malware onto Macs

Security hole in MacKeeper used to shove malware onto Macs | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Researchers at BAE just reported on a Mac bot known as OSX/Agent-ANTU that was allegedly distributed in a novel way.

The crooks used a security hole in a controversial Mac security and cleanup utility called MacKeeper.

MacKeeper quickly patched the hole after it became known, but until you received the update you were at risk of a Remote Code Execution (RCE) hole.

As long as you were unpatched, a crook could simply entice or redirect you to a poisoned website, and use a single line of JavaScript to send a command script to MacKeeper, which would then run it.

Unfortunately, according to BAE, some crooks struck while the iron was hot.

The crooks sent unpatched MacKeeper users to a web page that tricked their Macs into downloading the OSX/Agent-ANTU malware.


Here are some examples we've seen over the years where the Windows malware "playbook" has been followed, in some cases extremely effectively, on OS X:


2012: Java-based exploit. The Flashback malware was injected onto your Mac via an unpatched Java bug. Flashback was a bot, or zombie, meaning that crooks could remotely send it instructions to help them commit further cybercrime. Estimates suggest that more than 600,000 Macs ended up infected, supposedly including "274 from Cupertino."


2013: Word-based exploit. SophosLabs reported on attackers using an exploitable bug in Microsoft Word for Mac to target Chinese minority groups. If you opened a booby-trapped document, disguised as some sort of political commentary, the crooks got control of your Mac via zombie malware called OSX/Agent-AADL.


2014: Fake "undelivered item" documents. If you opened the bogus PDF file, really an application in disguise, you could end up infected with a data-stealing Trojan called OSX/LaoShu-A. Amongst other things, this one would find files such as documents, spreadsheets, presentations and archives...and send them to the crooks.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security




Gust MEES's insight:

Researchers at BAE just reported on a Mac bot known as OSX/Agent-ANTU that was allegedly distributed in a novel way.

The crooks used a security hole in a controversial Mac security and cleanup utility called MacKeeper.

MacKeeper quickly patched the hole after it became known, but until you received the update you were at risk of a Remote Code Execution (RCE) hole.

As long as you were unpatched, a crook could simply entice or redirect you to a poisoned website, and use a single line of JavaScript to send a command script to MacKeeper, which would then run it.

Unfortunately, according to BAE, some crooks struck while the iron was hot.

The crooks sent unpatched MacKeeper users to a web page that tricked their Macs into downloading the OSX/Agent-ANTU malware.


Here are some examples we've seen over the years where the Windows malware "playbook" has been followed, in some cases extremely effectively, on OS X:


2012: Java-based exploit. The Flashback malware was injected onto your Mac via an unpatched Java bug. Flashback was a bot, or zombie, meaning that crooks could remotely send it instructions to help them commit further cybercrime. Estimates suggest that more than 600,000 Macs ended up infected, supposedly including "274 from Cupertino."


2013: Word-based exploit. SophosLabs reported on attackers using an exploitable bug in Microsoft Word for Mac to target Chinese minority groups. If you opened a booby-trapped document, disguised as some sort of political commentary, the crooks got control of your Mac via zombie malware called OSX/Agent-AADL.


2014: Fake "undelivered item" documents. If you opened the bogus PDF file, really an application in disguise, you could end up infected with a data-stealing Trojan called OSX/LaoShu-A. Amongst other things, this one would find files such as documents, spreadsheets, presentations and archives...and send them to the crooks.


So, if you haven't yet crossed the bridge and become a Mac anti-virus user, now would be a good time to give it a go.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

iOS/OS X : Apple epinglé à nouveau pour des (grosses failles) de sécurité | XARA

iOS/OS X : Apple epinglé à nouveau pour des (grosses failles) de sécurité | XARA | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Plusieurs failles de sécurité ont été repérées par des chercheurs universitaires, celles-ci permettant de contourner la sécurité de l’application keychain, des sandbox des programmes ou encore les mesures de sécurité sur l’App Store.
La famille Xara

Et ce type de failles se retrouve un peu partout : selon les auteurs de l’étude, qui ont testé 200 applications choisies au hasard sur l'App Store, la grande majorité d'entre elles se révèlent vulnérables face à ces failles de sécurité. Si l’exemple de Keychain est le plus parlant, les chercheurs notent que ce type de vulnérabilités peut être utilisé pour accéder à de nombreux services et applications sur iOS et OSX. Au total, les chercheurs estiment que 88,6% des applications proposées sur l’Apple Store seraient vulnérables à ce type d’attaques.


En savoir plus / Merhr erfahren / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=XARA


Gust MEES's insight:
Plusieurs failles de sécurité ont été repérées par des chercheurs universitaires, celles-ci permettant de contourner la sécurité de l’application keychain, des sandbox des programmes ou encore les mesures de sécurité sur l’App Store.
La famille Xara

Et ce type de failles se retrouve un peu partout : selon les auteurs de l’étude, qui ont testé 200 applications choisies au hasard sur l'App Store, la grande majorité d'entre elles se révèlent vulnérables face à ces failles de sécurité. Si l’exemple de Keychain est le plus parlant, les chercheurs notent que ce type de vulnérabilités peut être utilisé pour accéder à de nombreux services et applications sur iOS et OSX. Au total, les chercheurs estiment que 88,6% des applications proposées sur l’Apple Store seraient vulnérables à ce type d’attaques.


En savoir plus / Merhr erfahren / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=XARA


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Firmware Bug in OSX Could Allow Installation of Low-Level Rootkits | Mac | Apple | EFI | CyberSecurity

Firmware Bug in OSX Could Allow Installation of Low-Level Rootkits | Mac | Apple | EFI | CyberSecurity | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
There is a vulnerability buried deep in the firmware of many Apple laptops that could allow an attacker to overwrite the machine’s BIOS and install a rootkit, gaining complete control of the Mac.

The vulnerability lies in the UEFI system on some older MacBooks, and researcher Pedro Vilaca discovered that after a MacBook is put to sleep and then brought back up, the machine’s low-level firmware is left unlocked.


Mehr erfahren/Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=EFI


Gust MEES's insight:
There is a vulnerability buried deep in the firmware of many Apple laptops that could allow an attacker to overwrite the machine’s BIOS and install a rootkit, gaining complete control of the Mac.

The vulnerability lies in the UEFI system on some older MacBooks, and researcher Pedro Vilaca discovered that after a MacBook is put to sleep and then brought back up, the machine’s low-level firmware is left unlocked.


Mehr erfahren/Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=EFI


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac OS X malware is heating up | Apple | Nobody Is Perfect | CyberSecurity

Mac OS X malware is heating up | Apple | Nobody Is Perfect | CyberSecurity | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
A new threat research report conducted by Bit9+ Carbon Black’s research team found that in 2015, there was 948 malware instances. The number of  OS X malware samples this year is five times greater than in 2010-2014 combined — where there was only 180 malware instances over a four-year period. Based on observations in a 10-week analysis: the research team anticipates MAC OS X malware to surge in the coming months.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
A new threat research report conducted by Bit9+ Carbon Black’s research team found that in 2015, there was 948 malware instances. The number of  OS X malware samples this year is five times greater than in 2010-2014 combined — where there was only 180 malware instances over a four-year period. Based on observations in a 10-week analysis: the research team anticipates MAC OS X malware to surge in the coming months.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

A dangerous silent AirDrop attack is threatening Apple users | CyberSecurity | NobodyIsPerfect

A dangerous silent AirDrop attack is threatening Apple users | CyberSecurity | NobodyIsPerfect | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.

Versions prior to the latest Apple OS version, the newborn iOS 9, are affected by a serious AirDrop Bug. The AirDrop Bug could be exploited by hackers to take full control of Apple iPhone or Mac machines.

The AirDrop Bug has been disclosed by the Australian security researcher Mark Dowd, AirDrop is a proprietary service that enables the transfer of documents among supported Macintosh computers and iOS devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=ZERODIUM


Gust MEES's insight:

A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.

Versions prior to the latest Apple OS version, the newborn iOS 9, are affected by a serious AirDrop Bug. The AirDrop Bug could be exploited by hackers to take full control of Apple iPhone or Mac machines.

The AirDrop Bug has been disclosed by the Australian security researcher Mark Dowd, AirDrop is a proprietary service that enables the transfer of documents among supported Macintosh computers and iOS devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=ZERODIUM


more...
Gust MEES's curator insight, September 23, 2015 11:33 AM
A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.

Versions prior to the latest Apple OS version, the newborn iOS 9, are affected by a serious AirDrop Bug. The AirDrop Bug could be exploited by hackers to take full control of Apple iPhone or Mac machines.

The AirDrop Bug has been disclosed by the Australian security researcher Mark Dowd, AirDrop is a proprietary service that enables the transfer of documents among supported Macintosh computers and iOS devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Scooped by Gust MEES
Scoop.it!

Mac OS X : une faille critique permet de subtiliser tous les mots de passe de l'utilisateur | Nobody Is Perfect

Mac OS X : une faille critique permet de subtiliser tous les mots de passe de l'utilisateur | Nobody Is Perfect | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
En faille critique viens d'être dévoilée, et cette fois c'est le système Mac OS X qui est concerné.


Le Trousseau d'accès ( Keychain) de Mac OS X souffre actuellement d'une faille qui permettrait à des pirates de récupérer l'intégralité des mots de passe y étant stockés. Ce qui se présente ainsi comme un espace sécurisé permettant de stocker ses accès devient une véritable boite de pandore.


En savoir plus / Mehr erfahren / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
En faille critique viens d'être dévoilée, et cette fois c'est le système Mac OS X qui est concerné.


Le Trousseau d'accès ( Keychain) de Mac OS X souffre actuellement d'une faille qui permettrait à des pirates de récupérer l'intégralité des mots de passe y étant stockés. Ce qui se présente ainsi comme un espace sécurisé permettant de stocker ses accès devient une véritable boite de pandore.


En savoir plus / Mehr erfahren / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

New Zero-Day Exploit Can Completely Brick Your Mac | Nobody Is Perfect | ICT | eSkills

New Zero-Day Exploit Can Completely Brick Your Mac | Nobody Is Perfect | ICT | eSkills | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
This zero-day exploit dubbed Thunderstrike 2 targets your Mac’s firmware thanks to an attached Thunderbolt accessory, such as an Ethernet adaptor or an external hard drive. After receiving the code via a phishing email or a malicious web site, malware code could look for connected Thunderbolt accessories and flash their option ROMs.

If you reboot your Mac with this infected Thunderbolt accessory plugged in, the EFI will execute the option ROM before booting OS X. As this option ROM has been infected, it will execute malicious code infecting the EFI itself. For example, it could simply make your Mac’s firmware refuse to boot OS X, turning your Mac into a useless machine. And if your firmware is compromised, there is no way to boot OS X, update the firmware and remove the malicious code.

The best part of this zero-day vulnerability is that your Thunderbolt accessory remains infected. If you plug your Ethernet adaptor into a new Mac, this Mac will get infected as well when it reboots. It’s not as harmful as malware that spreads through the Internet, but it could make some serious damage in an office environment for example.


Image credit (posted on Facebook) <===> http://www.pcworld.com/article/2955707/security/macs-can-be-remotely-infected-with-firmware-malware-that-remains-after-reformatting.html


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike


Gust MEES's insight:
This zero-day exploit dubbed Thunderstrike 2 targets your Mac’s firmware thanks to an attached Thunderbolt accessory, such as an Ethernet adaptor or an external hard drive. After receiving the code via a phishing email or a malicious web site, malware code could look for connected Thunderbolt accessories and flash their option ROMs.

If you reboot your Mac with this infected Thunderbolt accessory plugged in, the EFI will execute the option ROM before booting OS X. As this option ROM has been infected, it will execute malicious code infecting the EFI itself. For example, it could simply make your Mac’s firmware refuse to boot OS X, turning your Mac into a useless machine. And if your firmware is compromised, there is no way to boot OS X, update the firmware and remove the malicious code.

The best part of this zero-day vulnerability is that your Thunderbolt accessory remains infected. If you plug your Ethernet adaptor into a new Mac, this Mac will get infected as well when it reboots. It’s not as harmful as malware that spreads through the Internet, but it could make some serious damage in an office environment for example.


Image credit (posted on Facebook) <===> http://www.pcworld.com/article/2955707/security/macs-can-be-remotely-infected-with-firmware-malware-that-remains-after-reformatting.html


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike


more...
Fernando de la Cruz Naranjo Grisales's curator insight, August 5, 2015 2:16 PM
This zero-day exploit dubbed Thunderstrike 2 targets your Mac’s firmware thanks to an attached Thunderbolt accessory, such as an Ethernet adaptor or an external hard drive. After receiving the code via a phishing email or a malicious web site, malware code could look for connected Thunderbolt accessories and flash their option ROMs.

If you reboot your Mac with this infected Thunderbolt accessory plugged in, the EFI will execute the option ROM before booting OS X. As this option ROM has been infected, it will execute malicious code infecting the EFI itself. For example, it could simply make your Mac’s firmware refuse to boot OS X, turning your Mac into a useless machine. And if your firmware is compromised, there is no way to boot OS X, update the firmware and remove the malicious code.

The best part of this zero-day vulnerability is that your Thunderbolt accessory remains infected. If you plug your Ethernet adaptor into a new Mac, this Mac will get infected as well when it reboots. It’s not as harmful as malware that spreads through the Internet, but it could make some serious damage in an office environment for example.

 

Image credit (posted on Facebook) <===> http://www.pcworld.com/article/2955707/security/macs-can-be-remotely-infected-with-firmware-malware-that-remains-after-reformatting.html

 

Mehr erfahren / En savoir plus / Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike

 

Scooped by Gust MEES
Scoop.it!

Interested in Mac viruses? Here's Thunderstrike 2, a.k.a. the "firmworm"

Interested in Mac viruses? Here's Thunderstrike 2, a.k.a. the "firmworm" | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
One door closes, another one opens

Apple introduced security patches in OS X 10.10.2, released at the end of January 2015, in an attempt to shut off the Thunderstrike hole.

Unfortunately, it seems that Apple didn't close all the doors.

Hudson, together with two other researchers named Xeno Kovah and Corey Kallenberg, have figured out Thunderstrike 2, which they'll be showing off at Black Hat USA 2015 and Def Con, two security events taking place back-to-back this week in Las Vegas.

They've actually gone one step further with Thunderstrike 2.

As well as using a booby-trapped Thunderbolt Option ROM to modify your Mac's firmware, they've figured out how to include a virus in the modified firmware code.

Their virus will, in turn, attempt to modify the firmware of Thunderbolt devices you insert from then on, thus turning them into carriers of the firmware booby trap, too.

With a touch of techie humour, they've dubbed their firmware-borne virus a "firmworm".

Thunderbolt devices, of course, include removable hard disks...

...in an echo of Stuxnet, the virus that used USB devices to travel between computers on physically separate networks.

Unfortunately, while USB disks carrying Stuxnet could be purged altogether by overwriting them from inside your operating system, infectious Thunderbolt devices can't be cleaned up, or even detected, in that way.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike


Gust MEES's insight:
One door closes, another one opens

Apple introduced security patches in OS X 10.10.2, released at the end of January 2015, in an attempt to shut off the Thunderstrike hole.

Unfortunately, it seems that Apple didn't close all the doors.

Hudson, together with two other researchers named Xeno Kovah and Corey Kallenberg, have figured out Thunderstrike 2, which they'll be showing off at Black Hat USA 2015 and Def Con, two security events taking place back-to-back this week in Las Vegas.

They've actually gone one step further with Thunderstrike 2.

As well as using a booby-trapped Thunderbolt Option ROM to modify your Mac's firmware, they've figured out how to include a virus in the modified firmware code.

Their virus will, in turn, attempt to modify the firmware of Thunderbolt devices you insert from then on, thus turning them into carriers of the firmware booby trap, too.

With a touch of techie humour, they've dubbed their firmware-borne virus a "firmworm".

Thunderbolt devices, of course, include removable hard disks...

...in an echo of Stuxnet, the virus that used USB devices to travel between computers on physically separate networks.

Unfortunately, while USB disks carrying Stuxnet could be purged altogether by overwriting them from inside your operating system, infectious Thunderbolt devices can't be cleaned up, or even detected, in that way.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

A Privilege Bug in OS X Is Being Exploited to Hijack Macs | Nobody Is Perfect | Apple

A Privilege Bug in OS X Is Being Exploited to Hijack Macs | Nobody Is Perfect | Apple | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
A new bug in the latest, fully patched version of OS X is being exploited by hackers. The vulnerability allows attackers to install malware on a Mac without needing any system passwords.

Hot on the heels of the world’s first firmware worm for Mac, Ars Techinca reports that a bug first identified last week is now being exploited in the wild by hackers. The issue is a result of a new error-logging feature in OS X, which can be exploited by nefarious developers to create files with root privileges that can sit anywhere in the OS X file system.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
A new bug in the latest, fully patched version of OS X is being exploited by hackers. The vulnerability allows attackers to install malware on a Mac without needing any system passwords.

Hot on the heels of the world’s first firmware worm for Mac, Ars Techinca reports that a bug first identified last week is now being exploited in the wild by hackers. The issue is a result of a new error-logging feature in OS X, which can be exploited by nefarious developers to create files with root privileges that can sit anywhere in the OS X file system.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Thunderstrike 2: Mac-Firmware-Wurm soll sich über Thunderbolt-Adapter verbreiten

Thunderstrike 2: Mac-Firmware-Wurm soll sich über Thunderbolt-Adapter verbreiten | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Weitere EFI-Schwachstellen ermöglichen nach Angabe von Sicherheitsforschern die Modifikation der Firmware mobiler Macs. Ein Angreifer könne dadurch einen Schädling einschleusen, der sich über Thunderbolt-Adapter und Peripherie fortpflanzt.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike



Gust MEES's insight:
Weitere EFI-Schwachstellen ermöglichen nach Angabe von Sicherheitsforschern die Modifikation der Firmware mobiler Macs. Ein Angreifer könne dadurch einen Schädling einschleusen, der sich über Thunderbolt-Adapter und Peripherie fortpflanzt.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Macs can be remotely infected with firmware malware that remains after reformatting | Naivety | Nobody Is Perfect

Macs can be remotely infected with firmware malware that remains after reformatting | Naivety | Nobody Is Perfect | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
When companies claim their products are unhackable or invulnerable, it must be like waving a red flag in front of bulls as it practically dares security researchers to prove otherwise. Apple previously claimed that Macs were not vulnerable to the same firmware flaws that could backdoor PCs, so researchers proved they could remotely infect Macs with a firmware worm that is so tough to detect and to get rid of that they suggested it presents a toss your Mac in the trash situation.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike



Gust MEES's insight:
When companies claim their products are unhackable or invulnerable, it must be like waving a red flag in front of bulls as it practically dares security researchers to prove otherwise. Apple previously claimed that Macs were not vulnerable to the same firmware flaws that could backdoor PCs, so researchers proved they could remotely infect Macs with a firmware worm that is so tough to detect and to get rid of that they suggested it presents a toss your Mac in the trash situation.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Une faille de sécurité dans Yosemite donne accès au Mac | Apple | CyberSecurity

Une faille de sécurité dans Yosemite donne accès au Mac | Apple | CyberSecurity | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it
Le chercheur en sécurité Stefan Esser a mis le doigt sur une nouvelle faille de sécurité touchant OS X Yosemite. Exploitée comme il convient, elle donne aux malandrins un accès root au Mac, autorisant ainsi toutes les fantaisies les plus dangereuses, notamment l’injection de fichiers infectés et autres joyeusetés.


En savoir plus / Mehr erfahren / Learn more:



Gust MEES's insight:
Le chercheur en sécurité Stefan Esser a mis le doigt sur une nouvelle faille de sécurité touchant OS X Yosemite. Exploitée comme il convient, elle donne aux malandrins un accès root au Mac, autorisant ainsi toutes les fantaisies les plus dangereuses, notamment l’injection de fichiers infectés et autres joyeusetés.


En savoir plus / Mehr erfahren / Learn more:



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

« Apple n'a pas une culture de la sécurité adéquate »

« Apple n'a pas une culture de la sécurité adéquate » | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

Le Mac a-t-il un problème de sécurité ? On est en droit de se poser la question alors que les découvertes de failles se multiplient et qu'Apple n'y répond pas toujours promptement. Nous avons interrogé deux spécialistes. Vincent Bénony est le développeur de Hopper, un logiciel de rétro-ingénierie largement utilisé par les chercheurs de sécurité sur Mac (lire notre interview sur Hopper).


Pedro Vilaça, alias fG!, est un chercheur qui analyse et met à mal la sécurité d'OS X (voir son blog).


MacGeneration : Plusieurs failles de sécurité majeures ont été révélées au cours de ces derniers mois (rootpipeThunderstrikeXARA...). Avec toutes ces découvertes, on a l'impression que le Mac est plus vulnérable qu'avant. Est-ce seulement une impression ou est-ce bien le cas ?


Vincent Bénony : Je pense surtout que l’information est beaucoup plus relayée qu’avant, et comme il y a de plus en plus de monde sur Mac, forcément, ça fait plus de bruit…


Les systèmes sont développés en fonction des connaissances du moment, et il est difficile d’anticiper les problèmes. Plus un système sera utilisé, plus il aura de chances d’être étudié par des chercheurs, et plus ils remonteront des problèmes.


En plus, il est difficile de mutualiser avec ce qui se fait pour Windows, car la philosophie des deux OS est très différente. L’architecture de Linux est plus proche de celle d’OS X, mais les pratiques des utilisateurs sont très différentes, et les problématiques de sécurité qui en découlent aussi.


Gust MEES's insight:

Le Mac a-t-il un problème de sécurité ? On est en droit de se poser la question alors que les découvertes de failles se multiplient et qu'Apple n'y répond pas toujours promptement. Nous avons interrogé deux spécialistes. Vincent Bénony est le développeur de Hopper, un logiciel de rétro-ingénierie largement utilisé par les chercheurs de sécurité sur Mac (lire notre interview sur Hopper).


Pedro Vilaça, alias fG!, est un chercheur qui analyse et met à mal la sécurité d'OS X (voir son blog).


MacGeneration : Plusieurs failles de sécurité majeures ont été révélées au cours de ces derniers mois (rootpipeThunderstrikeXARA...). Avec toutes ces découvertes, on a l'impression que le Mac est plus vulnérable qu'avant. Est-ce seulement une impression ou est-ce bien le cas ?


Vincent Bénony : Je pense surtout que l’information est beaucoup plus relayée qu’avant, et comme il y a de plus en plus de monde sur Mac, forcément, ça fait plus de bruit…


Les systèmes sont développés en fonction des connaissances du moment, et il est difficile d’anticiper les problèmes. Plus un système sera utilisé, plus il aura de chances d’être étudié par des chercheurs, et plus ils remonteront des problèmes.


En plus, il est difficile de mutualiser avec ce qui se fait pour Windows, car la philosophie des deux OS est très différente. L’architecture de Linux est plus proche de celle d’OS X, mais les pratiques des utilisateurs sont très différentes, et les problématiques de sécurité qui en découlent aussi.

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple App Security Fails Leave Macs And iPhones Vulnerable To 'Devastating' Attacks | XARA

Apple App Security Fails Leave Macs And iPhones Vulnerable To 'Devastating' Attacks | XARA | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

It’s become almost axiomatic that Apple devices and the apps on them are more secure than the competition. But researchers continue to blow up that notion and today a group of academics have ripped apart the securityprotections in Mac OS X and iOS to show it’s not only possible to create malware and get it onto the App Store, but it’s also feasible to launch “devastating” attacks using rogue software to steal the most sensitive personal data around, from iCloud passwords and Evernote notes to dodgy selfies and more.


The attacks, known as unauthorized cross-app resource access or XARA, expose design flaws that allow a bad app to access critical pieces of data in other apps. As a result, Apple has struggled to fix the issues, according to apaper released today from Indiana University Bloomington, Peking University and the Georgia Institute of Technology.


En savoir plus / Merhr erfahren / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=XARA


Gust MEES's insight:

It’s become almost axiomatic that Apple devices and the apps on them are more secure than the competition. But researchers continue to blow up that notion and today a group of academics have ripped apart the securityprotections in Mac OS X and iOS to show it’s not only possible to create malware and get it onto the App Store, but it’s also feasible to launch “devastating” attacks using rogue software to steal the most sensitive personal data around, from iCloud passwords and Evernote notes to dodgy selfies and more.


The attacks, known as unauthorized cross-app resource access or XARA, expose design flaws that allow a bad app to access critical pieces of data in other apps. As a result, Apple has struggled to fix the issues, according to apaper released today from Indiana University Bloomington, Peking University and the Georgia Institute of Technology.


En savoir plus / Merhr erfahren / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=XARA


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple: Serious Zero-Day Security Flaw in iOS and OS X Could Lead to Password Theft

Apple: Serious Zero-Day Security Flaw in iOS and OS X Could Lead to Password Theft | Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security... | Scoop.it

 
"Note that all the attack apps were successfully released by the Apple Stores. So, the security threats are indeed realistic."
So, it's a serious problem. And, as yet, not fixed.

The university researchers say that they first reported the vulnerability to Apple on October 15 2014, and contacted them again in November 2014 and early this year. They claimed that Apple told them that because of the complex nature of the security issue, six months' grace would be required to develop a solution.

Unfortunately, that fix has still not emerged and the researchers have chosen to go public with their findings.

For now, until a proper solution is discovered, the most secure approach might be to exercise caution about what apps you download onto your Macs and iOS devices, even if they are listed in the official iOS and Mac App Store — stick with apps from known developers.


Learn more:


.
Gust MEES's insight:

Note that all the attack apps were successfully released by the Apple Stores. So, the security threats are indeed realistic."
So, it's a serious problem. And, as yet, not fixed.

The university researchers say that they first reported the vulnerability to Apple on October 15 2014, and contacted them again in November 2014 and early this year. They claimed that Apple told them that because of the complex nature of the security issue, six months' grace would be required to develop a solution.

Unfortunately, that fix has still not emerged and the researchers have chosen to go public with their findings.

For now, until a proper solution is discovered, the most secure approach might be to exercise caution about what apps you download onto your Macs and iOS devices, even if they are listed in the official iOS and Mac App Store — stick with apps from known developers.


Learn more:


more...
No comment yet.