Feeds

Mac OS X security under scrutiny

Even a mac can have holes

The Essential Guide to IT Transformation

When the SANS Institute, a computer-security training organization, released its Top-20 vulnerabilities last week, the rankings continued an annual ritual aimed at highlighting the worst flaws for network administrators. This year, the list had something different, however: the group flagged the collective vulnerabilities in Apple's Mac OS X operating system as a major threat.

It's the first time that the SANS Institute called out an entire operating system for its vulnerabilities. While the move has raised questions about the value of such a general warning, highlighting recent vulnerabilities in Mac OS X was intended as a wake up call, said Rohit Dhamankar, security architect for TippingPoint, a subsidiary of networking firm 3Com, and the editor for the SANS Top-20 vulnerability list.

"We are not pointing at the entire Mac OS X and saying you have to worry about the entire operating system," he said. "It is just that the Mac OS X is not entirely free of troubles."

The naming of Apple's Mac OS X to the list is the latest warning from security experts to users that Apple's operating system is not immune to threats. In its last two bi-annual reports, security firm Symantec has warned Apple users that the perceived security strengths of Mac OS X will not withstand determined attackers, especially with mounting vulnerabilities and at least one known rootkit tailored to the system. Symantec is the owner of SecurityFocus.

Such warnings, however, have to contend with the Mac OS X's impressive lack of major security incidents. While users of Microsoft Windows have to worry about the latest viruses, Trojan horse programs, spyware and phishing attacks, users of Apple's systems have significantly fewer threats about which to be concerned.

Still, if would-be attackers begin to focus on the operating system, then it's likely that major security incidents will not be far behind, said Nicholas Raba, CEO of Mac OS X security information and software site SecureMac.com.

"Mac OS X is currently more secure than Linux or Windows only for the fact that the shares of users is smaller thus the (number of) researchers discovering the flaws is smaller," Raba said.

Others point out that the vulnerability landscape is already shifting. The number of vulnerabilities patched by Apple in the Mac OS X rivals the number fixed by Microsoft in its operating systems, according to data from the Open Source Vulnerability Database. So far in 2005, Microsoft has released patches for 89 vulnerabilities, while Apple has released patches for 81 vulnerabilities, according to Brian Martin, content editor for the OSVDB. Counting flaws offers little more than a rough approximation of the threat to a particular operating system, Martin said, but it does show that Apple has gained the attention of the security community.

"A lot of the people who do vulnerability research started with Unix, and a lot of hackers have moved to Apple Mac OS X because it is cool and they can do anything they could do on Unix," he said.

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.