Nancy Gohring, writing for InfoWorld, delivered a misleading report yesterday on a Mac security exploit contest held at the CanSecWest conference in Vancouver, BC.
In her defense, it appears likely that Gohring did not write the headline for her InfoWorld article, which described the contest winner as being “able to remotely break into a Mac as part of a contest designed to illustrate security flaws in OS X.” That part was simply wrong.
Whoever did write the headline must have been smoking weed in celebration of 4/20, because Gohring’s article clearly described a local exploit. There’s a big difference between the remote exploits that made Windows infamous for its insecurity and a local exploit of an application.
Gohring reported that “contestants were invited to try to access one of two Macs through a wireless access point while the Macs had no programs running. No attackers managed to do so, and so conference organizers allowed participants to try to get in through the browser by sending URLs via e-mail.”
Opening an email URL that exposes a security flaw in Safari is both news to report and a problem for Apple to tackle, but reporting it as a remote exploit is inaccurate, irresponsible, and sloppy journalism, particularly for IDG's InfoWorld, which purports to be an authority on computing.
Gohring's Mac Security Myths.
Beyond the glaring error of conflating a remote exploit with something that requires a concerted effort between a user acting locally on the machine and an outside party, Gohring's article perpetuated a number of myths about Mac security.
Gohring quoted Dragos Ruiu, the principal organizer of the security conference, as saying, “You see a lot of people running OS X saying it's so secure, and frankly, Microsoft is putting more work into security than Apple has.”
Of course, the reason why Microsoft has been forced to ‘put so much work into security’ is because of the infamous reputation the Windows platform has earned as a security nightmare. Microsoft was entirely blind-sided by the Windows security crisis, and was forced to attack its security problems out of embarrassment.
Microsoft’s Security Embarrassment.
Microsoft originally designed Windows to work in isolated office environments where there were few nefarious threats present. Mac OS X is based on a Unix foundation, which grew a hardened security callous along with development of the Internet. Unix security has been exhaustively researched by experts for decades.
Mac OS X and Security.
In contrast, there are currently zero real viruses for Mac OS X. It's not that it is impossible to infect or exploit a Mac, it's that Apple hasn't shipped millions of Macs listening wide open for commands to act upon, or shipped a web browser designed to naively run programs like Microsoft's ActiveX did, or installed an email program designed to automatically run commands that arrive as attachments as Outlook did.
The Mac Minority Malware Myth
Gohring also repeated another myth in stating, “Macs haven't been targets for hackers and malicious code writers nearly to the degree that Windows machines have historically. That's in part because there are fewer Macs in use, thus making the potential impact of malicious code smaller than on the more widely used PCs.”
And while it's true that Macs make up only a small 2% of all the PCs sold worldwide, it's also true that Macs are commonly more valuable targets regardless of their distribution density. Further, Macs are not evenly distributed around the world.
For example, many schools are full of Macs; if they were easy targets because of wide open security flaws, school populations would see problems with Mac viruses. They do not. There are no real Mac viruses.
Do Apple's online Stores--and in particular the iTunes Store--all of which run WebObjects on Mac OS X Server on Xserves, ever suffer from security exploit attempts? Of course they do! We know the iTunes Store is under regular assault, because Apple has to regularly issue various fixes for iTunes.
The idea that Macs are not targets for hacking because there are not enough of them installed is laughable.
The reason why millions of botnet Windows PC are sending out spam is not because there are so many PCs, but because Windows security has been so bad for so long that all those millions of PC are easy targets to exploit. Simply plugging in a new PC to the open Internet will result in a rapid remote exploit of the machine within an hour.
For many years there have been millions of home routers running BSD and Linux, and PBXs running OS/2, and they aren't all virus ridden nightmares that spew spam from every pore. It's not the quantity of machines that makes exploits easy, it's the quality of the security on them.
Any security expert who is confused on that subject really needs to inform themselves better. IDG's InfoWorld is doing the world a disservice to offer up such rubbish information on the subject. Perhaps it should be rebranded as ConjectureWorld.
Corvettes aren't popular targets for theft because they are ubiquitous but rather because they are valuable. Similarly, if it were easy to remotely exploit Macs, they would offer hackers valuable targets both in environments where Macs are plentiful such as education, as well as sites where Macs are high profile goldmines, such as the iTunes Store servers.
Why Macs Aren’t Sending You Spam
Macs are not magically immune from security issues. The reason there are no viruses and very little malware for the Mac platform is a combination of several factors:
-
-
•Apple makes responsible efforts to design security into its products. Microsoft has a proven a track record of not taking security seriously over the last decade.
-
-
-
-
•Macs users have a community that recommends good software. In the Windows world, software comes in a wide range of quality and users are commonly not very selective or informed about what they install.
The real myth that Ruiu's CanSecWest Mac exploit contest demonstrated to be a fallacy is the idea that elite hackers attack systems for reputation and glory.
Listen up security pundits: hackers aren't after fame, they're exploiting security systems for money. As with any business, the easiest route is always to target the low hanging fruit first. In the computing world, that means exploiting PCs running Windows, not because they are common but because they offer an easy exploit for something of value: a way to send spam.
Next Articles:
This Series
Haloscan Q107