Feeds

Apple reneges on Black Hat security talk

Marketing drones demand Jobsian secrecy

Combat fraud and increase customer satisfaction

Black Hat Apple's politburo has put the kibosh on a presentation scheduled for the Black Hat security conference that was to give an inside look at the ultra-secretive company's security response team.

Black Hat officials had already given the Apple team the go-ahead when people inside Apple's marketing department vetoed the talk, which would have been the first time Apple has discussed its security practices. "Marketing got wind of it, and nobody at Apple is ever allowed to speak publicly about anything without marketing approval," a Black Hat organizer told IDG News.

Apple's policy of saying next to nothing about how it goes about protecting its users from escalating threats is, to say the least, unfortunate. Just last week, the company said it had patched its software from a serious flaw in the net's address lookup system. Three days after two separate researchers warned Mac clients are still vulnerable to the flaw, Apple hasn't uttered a word, an omission that generates confusion and doubt in those who depend on the vendor. Apple's tight-lipped policy contrasts sharply with practices at other companies such as Microsoft.

It isn't the first Apple talk to be pulled from consideration at Black Hat. Security researcher Charles Edge pulled his talk about a previously undisclosed weakness in Apple's File Vault encryption system out of concerns it might run afoul of confidentiality agreements he signed with Apple. A Black Hat representative said Edge had submitted a proposal to speak on the topic, but that it was pulled before officials ever accepted it. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.