Email Alerts
-
Machiavelli Mac OS X rootkit unveiled at Black Hat
Researcher Dino Dai Zovi presented details on a rootkit called Machiavelli, a proof-of-concept Mac OS X rootkit that seeks to dent what many Mac enthusiasts believe is an impervious OS. Article | 30 Jul 2009
-
Oracle to buy Sun Microsystems for $7.4 billion
IBM was the early favorite to purchase Sun, but Sun reportedly cast aside Big Blue's $7 million offer. Oracle gets the Sun Solaris OS, the most popular platform for Oracle's database. News | 20 Apr 2009
-
Serious holes in Mac OS X memory, researcher shows
A demonstration of hacking techniques at the SOURCE Boston conference enables an attacker to execute arbitrary code and take full control of a Mac. Article | 11 Mar 2009
-
New hacking method stealthily attacks Macs with malware
Italian researcher Vincenzo Iozzo demonstrates how to inject malicious code directly into Mac OS X memory, leaving no trace for forensics investigation. Article | 19 Feb 2009
-
Apple fixes critical QuickTime flaws
Media processing errors can be exploited by an attacker by passing malicious files. A successful attack could allow a person to gain access to critical files. Article | 23 Jan 2009
-
Linux systems actively targeted using SSH key attacks
Attackers install a rootkit on the compromised systems to steal more SSH keys. Article | 27 Aug 2008
-
Open source projects fall short on security
A new study shows many flaws in popular projects and the failure of open source developers to make security a priority. Article | 21 Jul 2008
-
Growing Mac use prompts call for better security
Some vendors, including Check Point and PGP see growth in whole-disk encryption for Mac OS X laptops on enterprise platforms. Article | 08 Jul 2008
-
Apple updates QuickTime to plug dangerous flaw
Media processing errors could be exploited remotely by an attacker to gain control of a victim's machine. Article | 10 Jun 2008
-
Apple patches dangerous Mac flaws
Apple issued updates to correct SSL certificate handling in Safari, video handling bugs and several graphics handling flaws that could be exploited remotely. Article | 29 May 2008
Security Management Strategies for the CIO