Apple punts security at conference

2012-07-27 08:22
Kaspersky Lab does analysis of malware threats at its offices in Moscow. (Duncan Alfreds, News24)

Kaspersky Lab does analysis of malware threats at its offices in Moscow. (Duncan Alfreds, News24)

Multimedia   ·   User Galleries   ·   News in Pictures Send us your pictures  ·  Send us your stories


VIDEO: Malware evolution

2012-07-19 10:03

Malware has evolved to match consumer patterns. In this YouTube video, Vitaly Kamluk, chief malware expert at Kaspersky lab explains the process.WATCH

Las Vegas - Apple pitched security measures in its mobile gadgets on Thursday during its first presentation at a premier gathering of hackers and those intent on thwarting cyber attacks.

The unprecedented talk by Apple head of software platform security Dallas De Atley at the 15th annual Black Hat conference in Las Vegas came as hackers increasingly target smartphones at the heart of internet age lifestyles.

"We are really excited to be here," De Atley said before launching into his presentation at a packed Caesars Palace ballroom.

"When we were developing the iPhone we realised there were aspects that make it different from computers," he continued.

"Security is architecture; you have to build it in from the very beginning. It is not something you can sprinkle over your code when it is done."


De Atley spent an hour providing insights into encryption, software keys and other security features built into the iOS operating system for iPhones, iPads and iPod touch devices.

Hacking attacks on mobile devices, especially Apple gadgets or those powered by Google-backed Android software, were hot topics at Black Hat, where developers voiced doubt that device makers are devoted to security.

Unlike other speakers at the week-long gathering, De Atley did not field questions from the audience. Instead, he brushed aside queries as he was ushered quickly out a side door after his talk.

His brusque departure underscored a complaint by developers, and those who craft security for Apple gadgets, that they are often left guessing answers to questions when dealing with the revered gadget maker.

"IOS is pretty secret," said Accuvent Labs principal research consultant Charlie Miller, who is credited with the first remote hacker exploit of an iPhone.

"How do they test their software before they ship it?" he continued, rattling off a litany of questions he'd like Apple to answer. "How do they determine an application is malicious and how many times has it happened?"

In the room where De Atley made his presentation, a team from security firm FishNet later announced that in the days ahead it will release a tool designed to expose security problems in applications tailored for Apple gadgets.

Security issues

"I feel like Apple's security is reactive and not proactive," said Seth Law of FishNet.

"They picked a great base to start from but continually get burned," Law continued. "The fact you can jailbreak an iPhone points to the fact that it is not rock solid."

With Apple boasting of more than 650 000 applications in its online App Store and the addition of more than a thousand a day, an automated way to check third-party software security is needed, according to the FishNet team.

Concerns in applications include whether they intrude on privacy by mining contact lists or other data on devices.

"The process for approving applications [for the App Store] is more about the business decisions than the security aspects," Law said. "Apple's testing in this case is the big unknown."

The list of rules Apple provides developers calls for software to work smoothly on devices but makes no mention of security issues, according to FishNet.

"Developers out there learn to game the system to push their apps through the registration process as fast as possible," Law said. "Apple is looking at how to best enforce their rules and make their money; they want their 30% cut."

California-based Apple gets 30% of the money from sales of virtual goods or subscriptions in applications on its globally popular devices.

Read more on:    apple  |  cybercrime  |  iphone  |  mobile

Join the conversation! encourages commentary submitted via MyNews24. Contributions of 200 words or more will be considered for publication.

We reserve editorial discretion to decide what will be published.
Read our comments policy for guidelines on contributions.

linking and moving

2015-04-22 07:36 publishes all comments posted on articles provided that they adhere to our Comments Policy. Should you wish to report a comment for editorial review, please do so by clicking the 'Report Comment' button to the right of each comment.

Comment on this story
Comments have been closed for this article.

Inside News24


Amazing solar inventions!

Solar power is lighting up the world, and not just on rooftops anymore.



Prince George the green prince?
Lean, green, drifiting machine
One man's $1 million vision for an eco Africa
China's air pollution at doomsday levels

Book flights

Compare, Book, Fly

Traffic Alerts

There is a tendency to get too caught up in group dynamics and high expectations and ideals, that your own personal needs more

There are new stories on the homepage. Click here to see them.


Create Profile

Creating your profile will enable you to submit photos and stories to get published on News24.

Please provide a username for your profile page:

This username must be unique, cannot be edited and will be used in the URL to your profile page across the entire network.


Location Settings

News24 allows you to edit the display of certain components based on a location. If you wish to personalise the page based on your preferences, please select a location for each component and click "Submit" in order for the changes to take affect.

Facebook Sign-In

Hi News addict,

Join the News24 Community to be involved in breaking the news.

Log in with Facebook to comment and personalise news, weather and listings.