Tag Archives: Security

Prevent Gatekeeper from auto-enabling in OS X

GateKeeperIconXGatekeeper is an execution prevention technology in OS X that will block apps from running if they have not been properly certified. It combines with similar technologies in OS X such as quarantining of downloaded files, to give you ample warning that a program you are running may be suspicious if it has not come from vetted sources, such as the App Store. Continue reading

Oversight in GateKeeper allows for an easy bypass

GateKeeperIconXApple’s GateKeeper is a background technology in OS X that helps thwart malware. It does so by assessing three levels of identification for an app (Unsigned, Signed, and Signed with App Store distribution), and then imposing options to block execution of apps that are either unsigned, or not distributed through the App Store. However, a simple workaround exists that can allow malware to overcome Gatekeeper’s blocks and run.  Continue reading

New Zero-Day memory injection vulnerability discovered in OS X

BurnIconXPCWorld is reporting that a new zero-day vulnerability has been found for OS X, which affects versions of OS X from 10.9.5 through to the recently-released 10.10.5. The problem comes from how NULL pointers in programs are handled, where malicious programs may use a special condition to bypass the default location where NULL code is directed to, and allow the program to bypass OS X’s security. Continue reading

Overcome Gatekeeper automatically re-enabling in OS X Yosemite

SecurityIconXThe Gatekeeper feature in OS X is a security measure that adds a layer of protection by only allowing Apple-approved apps to run, be they either from members of Apple’s developer community, or apps that are distributed in the App Store. This feature should be enabled by default, but if desired you can change Gatekeeper’s behavior, or disable it altogether. However, some OS X 10.10 users have found that after a while, Gatekeeper may re-enable automatically. Continue reading

Latest OS X security updates fix ‘Rootpipe’ vulnerability

SecurityIconXOne recent security flaw in Apple’s Mac OS platform that gained some press recently was the Rootpipe vulnerability, where security researcher Emil Kvarnhammer found a method of hacking a Mac that could bypass OS X’s security and allow the hacker to gain full administrative control of the system. This issue, which took advantage of faulty entitlements for XPC processes (small tools launched on the behalf of an application to take on workloads and spread the risk of a crash from affecting the main application), allowed a developer to break the sandboxing rules in OS X. Continue reading

Two-factor authentication comes to iMessage and FaceTime

NewMessagesIconXApple recently debuted a two-factor authentication approach for securing Apple IDs from hacking; however, this has been limited to authenticating on Apple’s Web site or making purchases using iTunes. Now Apple has expanded this security measure to work with its text, voice, and video messaging services. Continue reading

How to protect OS X from the “rootpipe” vulnerability

BurnIconXA relatively long-standing vulnerability in OS X has been uncovered by a Swedish hacker, Emil Kvarnhammar, who has dubbed it “rootpipe” by the so-far undisclosed method in which it can be used to take control of your Mac. In this vulnerability, a flaw allows a hacker to gain administrative access of a system without supplying a password, and then be able to interact with your Mac as an administrator. Continue reading