Is Apple's corporate culture a security risk?

Apple’s corporate culture has lead to high levels of secrecy, but will this work with security – especially as it grows its market share?

Trend Micro's security researcher Rik Ferguson said that Apple had spent a long time marketing the idea that the Mac OS X was inherently secure and didn't suffer from malware exploits.

He agreed with Cluley, saying that he would like to see Apple turn this around to be more open about what problems they've faced and were facing, and what they were going to do about them.

"It is starting from a secure model and a better place then most, but it could definitely be more open having a security team blog or doing more full disclosure."

Ferguson said that it was rare to see a zero-day vulnerability in Apple, but that it was difficult to say if that was because they didn't exist, or simply because they were not being fully disclosed.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"[Mac OS X] is becoming a much more widely used and popular platform deservedly so but they don't benefit from being secretive."

F-Secure security analyst Sean Sullivan said that the state of security at Apple was pretty good, but mostly because nobody was really targeting the Mac OS X platform like Windows.

F-Secure was currently developing a Mac anti-virus client, which was still in beta, mainly aimed at ISP partnerships that they re-sell through.

Sullivan believed that Windows 7 could be a turning point for Apple security, as Microsoft's attempts to lock it down security-wise could encourage malware authors to target Mac OS X.

He said: "The malware authors would have to change their business models somewhat."

Apple refused to answer any questions concerning its security model for this story, saying that there was no spokesperson available.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020