Einschränkung der Auswahl
Alle Artikel aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2008/2009
oder nur Artikel des
• Entwickler Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2008-2010
alle (lang!)
• Mobile Technology aus
2019
2016
2015
2014
2012/2013
alle (lang!)
• PHP Magazin / PHP User aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2009/2010
alle (lang!)
• windows.developer / dot.Net Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2008-2011
alle (lang!)
• oder der anderen Magazine
Mac Security – Ein Satz mit X?
Ist Mac OS X wirklich so sicher, wie oft angenommen wird?
Im
Entwickler Magazin 2.2013
ist ein Artikel über die Sicherheit von Mac OS X erschienen.
Der Artikel wurde auch im Rahmen der
Mac Security Week
auf der Website des WebMagazin veröffentlicht:
Links
- [1] Mac Developer Library: "App Sandbox Design Guide"
- [2] OS X Mountain Lion - It's built to keep your Mac safe
- [3] Carsten Eilers: "Kritische Schwachstellen, Schadsoftware - und Apple steckt den Kopf in den Sand"
- [4] the Month of Apple Bugs
- [5] Apple Fun - Announcements and discussion about the Month of Apple Bugs
- [6] Charlie Miller, Black Hat USA 2007: "Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X"
Präsentation (PDF)
Whitepaper (PDF)
- [7] Vincenzo Iozzo, Black Hat DC 2009: "Let Your Mach-O Fly"
Medien
- [8] Dino Dai Zovi, Charlie Miller; CanSecWest 2009: "Hacking Macs for Fun and Profit" (PDF)
- [9] Charlie Miller, Vincenzo Iozzo: Black Hat Europe 2009: "Fun and Games with Mac OS X and iPhone Payloads"
Medien
Präsentation (der angegebene Link ist falsch):
PDF
- [10] Dino Dai Zovi, Black Hat USA 2009: "Advanced Mac OS X Rootkits"
Medien
- [11] Dino Dai Zovi, Vincenzo Iozzo; Black Hat DC 2011: "WORKSHOP: The Mac Exploit Kitchen"
- [12] Vincenzo Iozzo, Black Hat Europe 2011: "WORKSHOP: The Mac Exploit Kitchen"
- [13] Patroklos Argyroudis, Dimitrios Glynos; Black Hat Europe 2011: "Protecting the Core: Kernel Exploitation Mitigations"
Whitepaper (der angegebene Link ist falsch):
PDF
Präsentation (der angegebene Link ist falsch):
PDF
- [14] Alex Stamos, Aaron Grattafiori, Tom Daniels, Paul Youn, B.J. Orvis; Black Hat USA 2011: "Macs in the Age of the APT"
- [15] Carsten Eilers: "Was ist ein Advanced Persistent Threat (APT)?"
- [16] Charlie Miller, Black Hat USA 2011: "Battery Firmware Hacking"
- [17] Core Security: "Apple OS X Sandbox Predefined Profiles Bypass"
- [18] Loukas K, Black Hat USA 2012: "DE MYSTERIIS DOM JOBSIVS: Mac EFI Rootkits"
- [19] Jonathan Grynspan: "FileVault 2’s Apple ID Backdoor"
- [20] Omar Choudary: "Analysis of FileVault 2 (Apple's full disk encryption)"
- [21] Bogdan Calin: "The Email that Hacks You"
- [22] Pwn2Own-Wettbewerb auf der CanSecWest
- [23] Dragos Ruiu, Mailingliste Dailydave: "PWN to OWN (was Re: How Apple orchestrated web attack on researchers)"
- [24] Robert Lemos, SecurityFocus: "A Mac gets whacked, a second survives"
- [25] Ryan Naraine: "10 questions for MacBook hacker Dino Dai Zovi"
- [26] Terri Forslof, Tipping Point DVLabs: "CanSecWest PWN to OWN 2008 (updated)"
- [27] Zero Day Initivative, Tipping Point DVLabs: "PWN to OWN Day Two: First Winner Emerges! (updated)"
- [28] Terri Forslof, Tipping Point DVLabs: "Pwn2Own 2009"
- [29] Terri Forslof, Tipping Point DVLabs: "Pwn2Own 2009 Day 1 - Safari, Internet Explorer, and Firefox Taken Down by Four Zero-Day Exploits"
- [30] Robert Lemos, SecurityFocus: "Browsers bashed first in hacking contest"
- [31] Aaron Portnoy, Tipping Point DVLabs: "Pwn2Own 2010"
- [32] Ryan Naraine: "Pwn2Own Safari Attack: Charlie Miller Hijacks MacBook"
- [33] Aaron Portnoy, Tipping Point DVLabs: "Announcing Pwn2Own 2011"
- [34] Peter Bright, Ars Technica: "pwn2own day one: Safari, IE8 fall, Chrome unchallenged"
- [35] Dennis Fisher: "Revamped Pwn2Own to Offer $105K in Prizes, Cash From Google for Chrome 0-Days"
- [36] Ryan Naraine: "Charlie Miller skipping Pwn2Own as new rules change hacking game"
- [37] Sophos: "Mac OS X MP3 Trojan horse threat overhyped, says Sophos"
- [38] Sophos: "Mac/Amphimix-A"
- [39] Sophos: "Renepo worm targets Mac OS X users, Sophos reports"
- [40] Sophos: "SH/Renepo-A"
- [41] Sophos: "OSX/Leap-A"
- [42] Sophos: "OSX/Inqtana-A"
- [43] Sophos: "Macarena Mac OS X malware - no need to panic"
- [44] Sophos: "SB/BadBunny-A"
- [45] Sophos: "BadBunny seen in "the wild"? OpenOffice multi-platform macro worm discovered"
- [46] Graham Cluley, Sophos: "Mac OS X RSPlug Trojan horse: in pictures"
- [47] Sophos: "Poisoned TV website adverts lead to PC and Mac scareware"
- [48] SophosLabs: "Poisoned Adverts hit TV sites"
- [49] Graham Cluely, Sophos: "A new Trojan horse for Mac OS X?"
- [50] Sophos: "Troj/RKOSX-A"
- [51] Graham Cluely, Sophos: "Mac malware - mea culpa"
- [52] Graham Cluely, Sophos: "More Mac OS X malware discovered"
- [53] Sophos: "OSX/Jahlav-A"
- [54] Graham Cluely, Sophos: "Reports of new Mac Trojan horse in pirated version of iWork '09"
- [55] Sophos: "OSX/iWorkS-A"
- [56] Graham Cluely, Sophos: "Reports of Mac Trojan in pirated Adobe Photoshop CS4"
- [57] Graham Cluely, Sophos: "Apple Mac malware: caught on camera"
- [58] Graham Cluely, Sophos: "Tored - a lame email worm for Mac OS X"
- [59] Graham Cluely, Sophos: "Snow Leopard malware protection in action"
- [60] Chester Wisniewski, Sophos: "Is Snow Leopard's bundled anti-malware enough?"
- [61] Graham Cluely, Sophos: "Mac shoot-em-up zaps your files - but is it game over for common sense?"
- [62] Zach Gage: "Lose/Lose"
- [63] Graham Cluely, Sophos: "New Mac backdoor Trojan horse discovered"
- [64] Sophos: "OSX/Pinhead-B"
- [65] Graham Cluely, Sophos: "Apple secretly updates Mac malware protection"
- [66] Paul Ducklin, Sophos: "Mac OS X OpinionSpy – same old, same old"
- [67] Carsten Eilers: "Boonana - Ein Trojaner, sie alle zu knechten!"
- [68] Chester Wisniewski, Sophos: "Mac OS X backdoor Trojan, now in beta?"
- [69] Chester Wisniewski, Sophos: "DarkComet RAT author denies BlackHole Mac Trojan is his"
- [70] Chester Wisniewski, Sophos: "Mac users hit with fake anti-virus when using Google image search"
- [71] Graham Cluely, Sophos: "Mac fake anti-virus attack adopts new disguise"
- [72] Chester Wisniewski, Sophos: "Mother's Day search terms lead to Mac rogue security software"
- [73] Chester Wisniewski, Sophos: "Apple malware evolved - No password required"
- [74] Chester Wisniewski, Sophos: "Apple releases update to protect against MacDefender"
- [75] Graham Cluely, Sophos: "Mac OS X Trojan hides behind malicious PDF disguise"
- [76] Graham Cluely, Sophos: "Flashback Mac Trojan poses as Adobe Flash update, opens backdoor"
- [77] Graham Cluely, Sophos: "Tsunami backdoor for Mac OS X discovered"
- [78] Graham Cluely, Sophos: "Mac malware: Tsunami backdoor variants discovered"
- [79] Graham Cluely, Sophos: "DevilRobber Mac OS X Trojan horse spies on you, uses GPU for Bitcoin mining"
- [80] Graham Cluely, Sophos: "Topless supermodel photos used to spread Mac malware"
- [81] Graham Cluely, Sophos: "Mac backdoor Trojan embedded inside boobytrapped Word documents"
- [82] Jeong Wook (Matt) Oh, Microsoft Malware Protection Center Threat Research & Response Blog: "An interesting case of Mac OSX malware"
- [83] Graham Cluely, Sophos: "Mac malware exploits unpatched drive-by Java vulnerability"
- [84] Chester Wisniewski, Sophos: "Apple patches Java hole that was being used to compromise Mac users"
- [85] Carsten Eilers: "Macs im Visier"
- [86] Carsten Eilers: "Das Flashback-Botnet und Apples Langsamkeit"
- [87] Carsten Eilers: "Macs und Schadsoftware, in allen möglichen Varianten"
- [88] Carsten Eilers: "Neues zu Flashback & Co. und WordPress"
- [89] Graham Cluely, Sophos: "Python-based malware attack targets Macs. Windows PCs also under fire"
- [90] Graham Cluely, Sophos: "Macs and malware - See how Apple has changed its marketing message"
- [91] Graham Cluely, Sophos: "Multi-platform backdoor malware targets Windows, Mac and Linux users"
- [92] F-Secure: "Multi-platform Backdoor Lurks in Colombian Transport Site"
- [93] Paul Ducklin, Sophos: "Mac malware Crisis on Mountain Lion eve?"
- [94] Graham Cluely, Sophos: "Mac malware spies on infected users through video and audio capture"
- [95] Sergey Golovanov, Kaspersky: "New malware for Mac: Backdoor.OSX.Morcut"
- [96] Lysa Myers, Intego: "More on OSX/Crisis — Advanced Spy Tool"
- [97] Lysa Myers, Intego: "OSX/Crisis Has Been Used as Part of a Targeted Attack"
- [98] Takashi Katsuki, Symantec: "Crisis for Windows Sneaks onto Virtual Machines"
- [99] Takashi Katsuki, Symantec: "Crisis: The Advanced Malware" (PDF)
- [100] Lysa Myers, Intego: "New Mac Trojan Masquerades as Installer for VKMusic App"
- [101] Dr. Web: "First fake-installer Trojan for Mac OS"
- [102] Roddell Santos, TrendMicro: "Fake Installer for Mac OS Charges Users via Their Mobile Account"
- [103] Mac Rumours: "Apple Quickly Updates Malware Definitions to Detect New SMS Scam Trojan"
- [104] Lysa Myers, Intego: "An Analysis of the Cross-Platform Backdoor NetWeirdRC"
- [105] Paul Ducklin, Sophos: "Apple zombie malware 'NetWeird' rummages for browser and email passwords"
- [106] F-Secure: "New Mac Malware Found on Dalai Lama Related Website"
- [107] Graham Cluely, Sophos: "Dockster Mac malware found on Dalai Lama-related website"
- [108] Manuel Gatbunton, TrendMicro: "Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor"
- [109] Lysa Myers, Intego: "OSX/Tsunami Variant Found Dropped by Java 0-Day"
- [110] Lysa Myers, Intego: "New Multiplatform Backdoor Jacksbot Discovered"
- [111] Carsten Eilers: "Digitale Schutzimpfung"
- [112] Carsten Eilers: "Anleitung: So schalten Sie Java im Browser aus"
- [113] Bundesamt für Sicherheit in der Informationstechnik (BSI): "BSI veröffentlicht Empfehlungen zur sicheren PC-Nutzung"
- [114] Bundesamt für Sicherheit in der Informationstechnik (BSI): "Sichere Nutzung von Macs unter Apple OS X Mountain Lion - für kleine Unternehmen und Selbstständige v1.0"