Feeds

Eugene Kaspersky frustrated by Apple’s iOS AV ban

Wants to retaliate first before crooks crack iOS

Internet Security Threat Report 2014

Eugene Kaspersky is “a little bit disappointed … Apple won’t let us” develop antivirus software for iOS devices, as he feels it is only a matter of time before criminals target the operating system.

“We as a security company are not able to develop true endpoint security for iOS,” Kaspersky told The Register in Sydney today. “That will mean disaster for Apple,” he opined, as malware will inevitably strike iOS in the future.

Kaspersky says the infection vector won’t be iOS itself, which he said is “by design is more secure” than other operating systems. He therefore rates it “almost impossible to develop malware which does not use vulnerabilities. The only way is to inject it into the source code of legal software. It will take place in a marketplace and then there will be millions or tens of millions of devices.”

Criminals have, to date, ignored this route because Kaspersky says “it is more complicated” than other attacks. “They are happy with Windows computers. Now they are happy with Mac. They are happy with Android. It is much more difficult to infect iOS but it is possible and when it happens it will be the worst-case scenario because there will be no protection. The Apple SDK won’t let us do it.”

The result of an attack on iOS, he feels, will be declining market share for Apple and a concomitant boost for Android, a platform he admits is less secure but which at least offers developers the chance to develop security software. A severe attack, Kaspersky argues, therefore has the potential to highlight the problems of a closed ecosystem and damage Apple permanently.

The Russian has even put his money where his mouth is on the issue, betting with friends that Android will achieve 80% market share by 2015, in part thanks to security issues on other platforms. ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.