iPhones-Macintosh computers become apples of hackers' eyesSecurity specialists said Saturday that hackers are taking increasing aim at iPhones and Macintosh computers as the hot-selling Apple devices gain popularity worldwide.
Hackers have historically focused devious de·vi·ous
1. Not straightforward; shifty: a devious character.
2. Departing from the correct or accepted way; erring: achieved success by devious means. efforts on computers using Windows operating systems Operating systems can be categorized by technology, ownership, licensing, working state, usage, and by many other characteristics. In practice, many of these groupings may overlap. because the Microsoft software has more than 90 percent of the global market, promising evil-doers a wealth of targets.
Macintosh computers have been gaining market share and catching the interest of hackers, according to according to
1. As stated or indicated by; on the authority of: according to historians.
2. In keeping with: according to instructions.
3. Zero Day Initiative (ZDI ZDI Zero Day Initiative (3Com/Tippingpoint) ) security vulnerability analyst Cameron Hotchkies.
"There are more eyes looking over Apple products for vulnerabilities," Hotchkies told AFP (1) (AppleTalk Filing Protocol) The file sharing protocol used in an AppleTalk network. In order for non-Apple networks to access data in an AppleShare server, their protocols must translate into the AFP language. See file sharing protocol. at a notorious annual DefCon gathering of hackers in Las Vegas Las Vegas (läs vā`gəs), city (1990 pop. 258,295), seat of Clark co., S Nev.; inc. 1911. It is the largest city in Nevada and the center of one of the fastest-growing urban areas in the United States. .
"It has slowly been growing as a target people are more and more interested in."
Hotchkies specializes in Apple software as part of a ZDI team devoted to scrutinizing programming holes and crafting "patches" to prevent hackers from exploiting weaknesses.
More than a thousand people crammed cram
v. crammed, cram·ming, crams
1. To force, press, or squeeze into an insufficient space; stuff.
2. To fill too tightly.
a. To gorge with food. into his DefCon talk about hacking See hack and hacker. Apple software. He was peppered with technical questions at the close of the session.
"There are a lot more people getting into it and really getting their hands dirty," said Hotchkies, who noted an obvious spike this year in the number of DefCon attendees toting Macintosh laptops.
"I've been seeing a lot of reverse engineering on the Apple platform."
Part of the reason for increased popularity of Macintosh computers is that Apple has made the machines friendlier to running programs popular on Windows-based machines.
Hackers experienced with attacking Windows programs can apply some of their know-how to software modified to run on Macintosh computers.
Developers that re-craft Windows programs for Macintosh systems might not be adept at building security components on the latest Leopard operating system operating system (OS)
Software that controls the operation of a computer, directs the input and output of data, keeps track of files, and controls the processing of computer programs. used in Apple machines.
"Windows developers take their code and make it work on Apple," Hotchkies said. "They could take potential vulnerabilities with them or possibly create new ones because they are working on an entirely different platform."
Apple's Safari operating system is the basis for internet browsing using iPhones, which are basically handheld mini-computers with telephone, music, and video viewing capabilities.
It took about a month for someone to hack a first-generation iPhone after its release, but an iPhone 3G was cracked within hours of the start of sales in July.
The hack is crowned a "jail break" because it liberates iPhone models from the shackles of deals Apple has with telecom giants providing exclusive service to the devices in varying countries.
"It shows people are getting proficient at analyzing Apple software," Hotchkies said.
"There are people looking at the iPhone. We pass vulnerabilities on to vendors, and when I communicate with Apple the first thing they ask is if we've tested it on the iPhone. They don't want to be surprised."
Apple engineers are also addressing "legacy issues," protecting old software from new threats, according to Hotchkies.