{"id":15332,"date":"2019-05-16T06:30:02","date_gmt":"2019-05-16T14:30:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/16\/news-9081\/"},"modified":"2019-05-16T06:30:02","modified_gmt":"2019-05-16T14:30:02","slug":"news-9081","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/16\/news-9081\/","title":{"rendered":"Do Apple devices need anti-virus software?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/05\/cso_phishing_social_engineering_security_threat_by_weerapatkiatdumrong_gettyimages-489433130_3x2_2400x1600-100796450-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Thu, 16 May 2019 06:03:00 -0700<\/strong><\/p>\n<p>Apple\u2019s devices are far better defended against malware and viruses than other platforms, but does this mean they don\u2019t need anti-virus software?<\/p>\n<p>I\u2019ve lost track of the number of times Mac users have told me Macs don\u2019t need virus protection because they are inherently more robust against such attacks.<\/p>\n<p>I\u2019ve also lost count of how many security researchers have said that Apple devices are becoming more liable to being attacked as their <a href=\"https:\/\/blogs.computerworld.com\/article\/3262225\/apple-mac\/warning-as-mac-malware-exploits-climb-270.html\" rel=\"nofollow\">market share grows<\/a>.<\/p>\n<p>Both are right. Both are wrong.<\/p>\n<p>The nature of cyberattacks are changing.<\/p>\n<p>One good illustration of how the nature of these threats are changing comes in the form of the recently-revealed Intel processor vulnerability, \u2018<a href=\"https:\/\/techcrunch.com\/2019\/05\/14\/zombieload-flaw-intel-processors\/\" rel=\"nofollow\">ZombieLoad<\/a>\u2019.<\/p>\n<p>This flaw lets hackers use design weaknesses in Intel chips (back to 2011) to steal data from machines, including Macs.<\/p>\n<p>Apple very quickly shipped security patches to protect against this vulnerability and published a <a href=\"https:\/\/support.apple.com\/en-us\/HT210107\" rel=\"noopener nofollow\" target=\"_blank\">detailed support document<\/a> that Mac users who handle particularly sensitive data should read.<\/p>\n<p>Traditional computer security models have relied on perimeter protection \u2013 that\u2019s things like firewalls, virus checkers and malware detection.<\/p>\n<p>But these defences simply aren\u2019t robust enough to tackle or spot a threat like ZombieLoad.<\/p>\n<p>The important thing about ZombieLoad is that it shows how as platforms become more secure, attackers are exploring far more sophisticated ways to exploit devices.<\/p>\n<p>They seek out vulnerabilities on a component level, and also engage in highly sophisticated phishing attacks that encourage people to click links that download malware to their machines.<\/p>\n<p>These have interesting names \u2013 Roaming Mantis, for example, offered payloads that worked differently on different platforms \u2013 phishing for iOS and DNS-hijacking on Android. These attacks appear frequently, are fixed and then refined.<\/p>\n<p>There have even been attempts to <a href=\"https:\/\/www.wired.com\/story\/android-smartphones-vulnerable-out-of-the-box\/\" rel=\"noopener nofollow\" target=\"_blank\">subvert device security<\/a> before products leave the factory.<\/p>\n<p>A hacker may have designed a one-off piece of malware, most likely in a standard programming language, that has only one function \u2013 to subvert security in a computer and download a more malware-infested package in the background \u2013 or to gather user data for a couple of weeks before sending it back to its command and control server in the middle of the night when no one is watching.<\/p>\n<p>The complexity of such attacks makes it very difficult for existing anti-virus or anti-malware protections.<\/p>\n<p>They may not even be aware of the code used in an attack \u2013 which means they won\u2019t spot it.<\/p>\n<p>Attackers are also finding ways to subvert things like Wi-Fi routers and poorly-secured connected home\/office systems to penetrate networks.<\/p>\n<p>The best defences against such attacks consist of a combination of traditional permiter defences as well as learning to use <a href=\"http:\/\/www.applemust.com\/how-to-use-apples-new-privacy-feature-for-ios-and-mac\/\" rel=\"noopener nofollow\" target=\"_blank\">Apple\u2019s built-in anti-phishing tools<\/a>.<\/p>\n<p>Existing security protections are being bypassed by highly sophisticated exploits, some of which may have been designed to be used once and never used again.<\/p>\n<p>What does this mean to an Apple user?<\/p>\n<p>It means complacency is no defence.<\/p>\n<p>Merely because when you run a virus check application it doesn\u2019t spot anything on your device doesn\u2019t necessarily mean you\u2019re safe.<\/p>\n<p>There are Mac malware \u201ckits\u201d available for sale on the dark web for <a href=\"https:\/\/www.computerworld.com\/article\/3293922\/apple-users-most-appealing-to-cybercriminals-online-scams.html\">just a few dollars<\/a>.<\/p>\n<p>Many don\u2019t work well, some don\u2019t work at all, but a few work a little \u2013 though most of these rely on a user downloading and installing code, rather than traditional virus\/malware attack trajectories. (&#8216;Phishing&#8217;).<\/p>\n<p>These increasingly sophisticated attacks leave little trace and are very difficult to detect using traditional permiter protections.<\/p>\n<p>We&#8217;re also seeing rapid increase in attacks against component elements of the system &#8212; \u00a0Check Point claims 51 percent of enterprises have seen attacks launched against their cloud backup systems, proving that if an attacker can\u2019t hack your iPhone or Mac, they might try to subvert your cloud storage service instead.<\/p>\n<p>In this case, machine intelligence.<\/p>\n<p>Modern enterprises protect themselves using complex tools from the big security vendors.<\/p>\n<p>These security firms share attack data and develop monitoring systems that <a href=\"https:\/\/www.orange-business.com\/en\/magazine\/advanced-persistent-threats-who-are-they-what-do-they-want-and-how-can-you-hit-back\" rel=\"noopener nofollow\" target=\"_blank\">watch internal and externally-bound network traffic in order to spot anomalies<\/a>.<\/p>\n<p>Is that little-used computer in the accounts department sending a zip file in the middle of the night over the weekend? Who to? Why?<\/p>\n<p>AI is helping most platform, OS and security vendors develop monitoring systems to watch for such events.<\/p>\n<p>I imagine we\u2019ll see platform providers develop and augment existing platform-based protections with AI-driven protection in future.<\/p>\n<p>I hope I\u2019ve made an argument that speaks to the diverse and complex nature of the modern threat landscape, but what does this tell us about running anti-virus software on iOS or Mac?<\/p>\n<p>I think its common sense to use malware and anti-virus protection as part of a package of security deterrents.<\/p>\n<p>I also think it\u2019s the digitally responsible thing to do. Checking your systems for viruses and malware isn\u2019t just about protecting yourself, it\u2019s also about protecting others (mostly on other platforms) you may inadvertently infect if your system carries a virus.<\/p>\n<p>I\u2019m not convinced such protections need to be \u2018always-on\u2019 when using Apple\u2019s systems, in part because the attacks most likely to subvert those systems tend to be undefined, but also because the checkers tend to slow our systems down.\u00a0<\/p>\n<p>However, as\u00a0the nature of cyber-attack continues to change, I think it\u2019s important that every user does what they can to protect themselves \u2013 and others.<\/p>\n<p><strong>Also read:\u00a0<\/strong>Apple\u2019s\u00a0<a href=\"http:\/\/aos.prf.hn\/click\/camref:1100laKZ\/pubref:US-011-3237768-000-000000-web\/destination:http:\/www.apple.com\/business\/docs\/iOS_Security_Guide.pdf\" rel=\"nofollow\">security white papers<\/a>,\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3237768\/apple-ios\/strong-and-stable-the-ios-security-guide.html\">this iOS security guide<\/a>, and this\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3237187\/apple-mac\/lock-it-down-the-macos-security-guide.html?nsdr=true\">macOS security guide<\/a>.<\/p>\n<p>Please follow me on<em>\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3395861\/do-apple-devices-need-anti-virus-software.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/05\/cso_phishing_social_engineering_security_threat_by_weerapatkiatdumrong_gettyimages-489433130_3x2_2400x1600-100796450-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Thu, 16 May 2019 06:03:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Apple\u2019s devices are far better defended against malware and viruses than other platforms, but does this mean they don\u2019t need anti-virus software?<\/p>\n<h2><strong>No, yes and maybe<\/strong><\/h2>\n<p>I\u2019ve lost track of the number of times Mac users have told me Macs don\u2019t need virus protection because they are inherently more robust against such attacks.<\/p>\n<p>I\u2019ve also lost count of how many security researchers have said that Apple devices are becoming more liable to being attacked as their <a href=\"https:\/\/blogs.computerworld.com\/article\/3262225\/apple-mac\/warning-as-mac-malware-exploits-climb-270.html\" rel=\"nofollow\">market share grows<\/a>.<\/p>\n<p>Both are right. Both are wrong.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3395861\/do-apple-devices-need-anti-virus-software.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,10480,21640,10554,714],"class_list":["post-15332","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-ios","tag-macs","tag-mobile","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15332"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15332\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15332"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}