The State of Apple Security

A small market share and a trusted development environment protected Apple a long time, but will that last? Plus, EXCLUSIVE: more data on who's behind XCodeGhost.

Sara Peters, Senior Editor

October 14, 2015

8 Slides

For years, Apple users felt snug (and smug) in the knowledge that a smaller market share made Apple operating systems a less tempting attack target and that Apple's closed development environment succeeded in keeping the App Store free of malicious Mac and iOS apps. Yet, recent events suggest that Apple users might no longer be able to rely on those protections.

The popularity of iOS -- even in the enterprise -- has made attackers more interested in cracking into Apple's locked-down development environment. They're starting to make a dent: the proof is in recent events, like XCodeGhost -- which snuck Trojanized iOS apps into the official App Store -- and proof-of-concept exploits that allow unsigned code to run on OS X. Research released today by Bit9 + Carbon Black Threat Research found that five times more OS X malware appeared in 2015 than during the previous five years combined.

After years of getting away with low standards, Apple security vendors might not be ready with products that can handle this new threat landscape.

Read on for DarkReading's take on the state of Apple security. Plus, in a DarkReading exclusive, researchers at ThreatBook Labs provide more information about the creators of XCodeGhost and explain that while the authors may have tweeted a public apology about their actions, their intentions weren't so innocent.

About the Author

Sara Peters

Senior Editor

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights