Apple Mac Security Immunity Is Over!

IT security threats are constantly changing, and they have the potential to impact every one of us. Staying on top of the latest threats and understanding how to protect themselves is a full time job for many IT security managers around the world.

A report released this week predicts more malware on Macs, increase in cyber warfare in the Middle East and social networks used increasingly for stealth attacks. The report brings together information from 18,000 security professionals around the world to provide the definitive overview of the IT security threats facing the world today.

Highlights from the report include:

  • Social networks are the new stealth channel for malware command and control
  • Political and espionage breaches rise, but financially-driven theft is still the major driver
  • Increasing evidence of state-sponsored infiltration of political enemies via targeted malware
  • Java, Office and Flash continue to be the largest attack surface for delivering malware
  • Apple OSX malware proves that, just like Windows, the OS is only as secure as the software installed on it
  • New remote desktop software exploits highlight the importance of protecting remote access systems
  • Criminals aren’t the only ones to bypass mobile device security as law enforcement agencies use their techniques too

Mac users, who perhaps experienced a certain degree of smugness in the past based on the relative invulnerability of their chosen computing platform, have found themselves to be at risk since the emergence of serious malware for OSX (the Mac operating system). These systems use exploits in third-party software to infect compromised systems with Trojans – and has resulted in Apple having to respond to the threat of malware on its systems.

Mobile Threats

Mobile malware is increasing exponentially, especially on the Android platform – which correlates with the Bring Your Own Device (BYOD) trend, where consumers are increasingly using their personal tablets and mobile devices for work purposes. This leaves corporations open to security threats through the ‘back door’ if they don’t act quickly and decisively to protect themselves, as mobile devices truly become the new ground in the battle to control the endpoint.

An interesting twist in the tale as mobile devices become more and more laden with information, is the pressure from law enforcement on Google and Apple (to name just two) to help them bypass security systems on mobile devices of criminals.

Targeted Attacks

Spearphishing emails continue to be the preferred method of delivering targeted malware to specific organisations, as seen by the Chinese-backed infiltration of Tibetan organisations. (Interestingly, my company itself became a target for the cyber criminals who spoofed email addresses to try to gain the trust of innocent targets.) It all highlights the need for all organisations, no matter what they do or where they are, to examine incoming emails with more than standard off-the-shelf antispam and antivirus tools.

Cyberwar in the Middle East

The internet has become the new battleground in the Middle East, as on-the-ground conflicts have exploded into the digital world. Military, government and civilian groups have all been targeted, primarily using techniques such as SQL Injection or DDos attacks. The battles have seen attacks and responses from all sides, triggering Middle Eastern countries to start training in preparation for attacks on critical infrastructure. The ideologically-driven nature of the activities means that they are likely to continue and intensify in the coming months.

SHARETweet about this on TwitterShare on LinkedInShare on FacebookShare on Google+Pin on PinterestDigg thisShare on RedditShare on TumblrShare on StumbleUponEmail this to someone

Roger’s career has been dedicated to the development of technology and new business ventures based on technical innovation. Over 25 years in the Silicon Valley and abroad, he has driven the formation and growth of dozens of new companies and hundreds of products; serving in a wide range of roles from engineering, marketing, management and investor/advisor. In 2002, Roger founded Fortify Software which was incubated by Kleiner Perkins Caufield & Byers and recognised by Business 2.0 magazine as one of the Valley’s “Smartest Start-Ups”. Fortify was sold in 2010 to HP. He now has taken up the post of CTO at AlienVault as he believes that a new approach is needed. Roger earned his BS and MS degrees in Engineering with honors at San Jose State University. Roger continues his advisory work with select venture capital firms and start-up companies around the globe. He also regularly provides counsel and advice to corporate executives and government leaders on the topics of cyber-security policy and emerging trends.