Feeds

Month of Apple bugs planned for January

A patch a day keep the hackers at bay

Using blade systems to cut costs and sharpen efficiencies

Security researchers plan to release details of previously undisclosed Mac OS X or Apple application security bugs every day in January. The Month of Apple Bugs project is the brainchild of Kevin Finisterre and the folks behind November's Month of Kernel Bugs (MoKB) project.

The security researchers told the Washington Post that, as with Apple bugs featured during the MoKB project, Apple would receive no advanced notice of the forthcoming security problems. The security researchers hope to use the project to dispel the perception that Apple systems are free of the security bugs that have long plagued Windows users.

"OS X users still think their system is bulletproof, and some people are interested on making it look that way," LMH of the MoKB project told the Washington Post.

Quite what Apple's response to the project might be, or how much will come of it, remains unclear. A planned month of Oracle Database bugs protect due to take place this month was cancelled almost as soon as it was announced. Cesar Cerrudo, founder and chief exec of the Argeniss Security Research Team, is yet to publically explain why he dropped the protect, which was designed to push Oracle into releasing software fixes more quickly.

Back in the present time, Apple posted a Mac OS X security update on Tuesday (2006-008) which fixes a security bug that meant that whatever appeared on a users' web cam could be uploaded onto a remote server. Ooh er, Missus. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.