Hardly three months after a series of Mac computers, powered by new M1 chips, was launched, a security researcher has discovered malware written specifically for this platform.
A row has broken out between researchers from Google after ex-NSA hacker Patrick Wardle revealed the details of two zero-day vulnerabilities in the Mac version of Zoom that could be exploited to give the attacker root access. Neither vulnerability is remotely exploitable and can only be taken advantage of by a local attacker – someone who has physical access to the machine in question.
Jamf, an Apple-only implementation and management company, has acquired endpoint protection solutions for Mac vendor Digita Security.
Macs don’t get malware – seriously? Even on a fully patched OS X 10.11.2 system that Apple has supposedly ‘fixed’ its Gatekeeper anti-malware feature fails to block the execution of untrusted code.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]