macOS Archive

Gartner: OS X More Appealing Than Desktop Linux

OS X is more appealing to enterprises as a desktop operating system than ever before and although it is unlikely to take market share away from Windows, the Mac could reduce the number of Linux-based desktops, according to research group Gartner. In a report published by Gartner this week titled Enterprise Mac Clients Remain Limited, but Apple's Appeal is Growing, analysts Michael Silver, Neil MacDonald, Ray Wagner and Brian Prentice, said that administrators will most likely have to prepare for more Mac systems in their environment even though OS X is "not a suitable enterprise wide platform". Ars weighs in on the issue as well.

Apple Reiterates: No Interest in Virtualization for Leopard

Speaking to an analyst this month, executives for Apple Computer maintained that the company has no plans to incorporate virtualization technology into the final version of its Boot Camp software that will ship as part of Mac OS X 10.5 Leopard next spring. "Apple indicated that it is very pleased with Parallels software and didn't feel the need to compete with its own version of embedded virtualization," Bear Stearns analyst Andy Neff wrote in a research note to clients this week.

Using the ImageIO Framework with Mac OS X 10.4 Tiger

"The ImageIO framework, introduced in Mac OS X 10.4 Tiger, allows applications to read and write popular image file formats. ImageIO works in conjunction with Quartz and is designed for maximum performance, convienient metadata access, and color management. As the definitive way to access image data on Mac OS X, you should consider using ImageIO in your application as a high-performance substitute for Image Importers or other image handling libraries. This article gets you started working with ImageIO, shows how to read and write data to and from Quartz, and points to some of the capabilities in working with Core Image that you can explore further on your own."

Proof-of-Concept Adware Program for OS X?

On Thursday, antivirus firm F-Secure published a brief analysis of a proof-of-concept adware program for the Mac OS X that could theoretically hook into any application to run attacker-specified code. The program, dubbed IAdware by F-Secure, could be silently installed in a user's account without requiring administrator rights. "We won't disclose the exact technique used here - it's a feature not a bug - but let's just say that installing a System Library shouldn't be allowed without prompting the user," stated F-Secure in the blog post. "Especially as it only requires copy permissions." My take: I'd say, hand over the code, then we'll talk.

Multiple Security Vulerabilities Found In Apple’s Disk Image Software

The 'Month of Kernel Bugs' project has found two unpatched security vulnerabilities in the way Mac OS X handles .dmg files. The first vulnerability, rated 'highly critical' by security-firm Secunia, can lead to privilege escalation, denial of service, and system access by a remote user (if Safari's open 'safe' files option is checked). The second issue is similar in nature, in that a corrupted UDTO HFS+ .dmg can lead to a denial of service condition. A workaround for both issues is to disable Safari's option to open 'safe' files after downloading, and to not open any .dmg file from a source you do not trust.

Apple Strengthens Mac OS X 10.5 Leopard with New Build

Apple this week delivered to developers Mac OS X 10.5 Leopard build 9A303, the latest in an extremely limited series of pre-release builds of its next-generation operating system. People familiar with the new distribution of the software, labeled Mac OS X 10.5 Leopard build 9A303, say one of its primary objectives of the release is to knock out several 'performance related bugs' that were present in 9A283.

Why Are Mac Users So Defensive?

"Yesterday, I read what I consider to be a provoking piece at ZDNet. It pointed out that while there is no question that Macs are not the malware targets that Windows machines are, they're most certainly not immune to an attack of the right variety. It went on to backup its point with a real world scenario in which a University of New South Wales Mac server had been hit by malware. Disturbingly, the server had apparently been running the latest updates from Apple and still managed to get hit. It mentioned that, in the author's opinion, Apple was 'misleading people' into believing that their OS was more secure than it really is. Whether or not that is true is frankly immaterial to me. It should be noted that no OS is 100 percent bulletproof, and I believe this is what it was driving home at. Unfortunately, some people within the Mac community felt differently."

OS.X Macarena ‘Virus’: No Viable Threat Posed

"OS.X Macarena poses no viable threat as currently conceived. Although we don't have our hands on the virus source code, according to Symantec (who initially publicized the virus last week) OSX.Macarena can infect neither PowerPC-exclusive binaries, nor Universal binaries. It can only affect binaries that are Intel-specific. That would include various system files, but since OSX.Macarena can only infect files in its own directory and has no means of gaining the privileges necessary to escalate into directories where most system files are stored, the the threat level is mitigated."

‘Macarena’ Virus Targets Macs

Source code for a Mac virus has gone public, a security company warned Friday, and although the original doesn't carry a malicious payload, more dangerous variants can be expected. The virus, dubbed 'OSX.Macarena' by Symantec, targets some, but not all, Mac OS X Mach-O executables. "Although methods of infecting Mach-O binaries have been publicly available for some time, this marks the first known fully functional Mach-O file infecter virus," Symantec noted in an alert to customers of its DeepSight threat network on Friday. "The source code for this virus is publicly available and as such it is possible that variants may be trivially developed to extend the virus's functionality."

Exploit Released for Airport Drivers

Metasploit founder HD Moore has released an exploit for an unpatched vulnerability in the Apple Airport driver that ships with some PowerBook and iMac computers. Moore said the exploit is not related to the Wi-Fi driver flaws discovered and discussed in Aug. 2006 by researchers David Maynor and Jon Ellch at the Black Hat Briefings. Moore, who is collaborating with Ellch on Wi-Fi flaw research, named the exploit after Daring Fireball, a Mac blogger who doubted the Black Hat findings and issued a public challenge to Ellch and Maynor.

Working with the WebKit Nightly Builds

"One of the main benefits of an open source WebKit is allowing developers to download nightly browser builds from the WebKit Open Source Project page. Nightly builds allow you as a developer to prepare for changes before they wind up on your users' desktops. This article describes how you can leverage WebKit nightly builds to determine how changes in the framework may affect your web content, Dashboard widgets, or WebKit-based application in future versions of Mac OS X."

Mac OS X 10.4.8 Runs on Generic x86 – Sort of

Mac OS X 10.4.8 will now run on any generic x86-based PC. Well, almost. Kernel coder Semthex has posted what he claims is an entirely legal release of the Mac operating system's foundation layer. The only snag: you can't boot into the familiar GUI. To date, the version of Mac OS X for x86 processors has relied on kernel add-ons to anchor the software to Apple's own hardware through the machines' Trusted Platform Module. Much of the core code is independent of it, however, and available for access to all and sundry via Apple's own source code licence. What Semthex has claimed to do is produce code that essentially bypasses the TPM stuff yet stays within the Apple licence.

Wozniak: Apple Didn’t Need NeXT, OS 9 More Secure Than OS X

Apple co-founder Steve Wozniak says that Apple did not need NeXT, the company that provided the foundation for Mac OS X; he argues that System 7 wasn't nearly as bad as it was made out to be. Wozniak also says that Mac OS 9 was more secure than OS X is now: Mac OS X is built in Unix and is therefore more prone to attacks because people are familiar with the holes in Unix, explained Woznaik. "Some of the holes in Unix are well known. So keeping Firewalls on is more important. And we keep announcing, even our own security fixes, not as many as Microsoft but still we never really had those in the OS 9 days."

Security Analysts: Mac Attacks Rare But May Rise

"Apple computers have long been prized for being relatively virus-free. But as more people use Apple products, experts say the company is increasingly becoming a target for cyber pranksters and criminals writing viruses and other forms of malware. Oliver Friedrichs, director of security response at Symantec, a leading anti-virus software vendor, said 72 vulnerabilities were discovered in the Mac's OS X operating system in 2006, up from 19 in 2004." Please consider the source, though.

Understanding Apple’s Binary Protection in Mac OS X

"With the advent of Intel-based Macintosh computers, Apple was faced with a new requirement: to make it non-trivial to run Mac OS X on non-Apple hardware. The 'solution' to this 'problem' is multifaceted. One important aspect of the solution involves the use of encrypted executables for a few key applications like the Finder and the Dock. Apple calls such executables apple-protected binaries. In this document, we will see how Apple-protected binaries work in Mac OS X."

Apple Lists Dev Enhancements in 10.5, Launches Faster MacBook Pros

Apple has just released a new web page with developer information concerning Mac OS 10.5, Leopard. Among other things, the list includes: OpenGL 2.1, resolution independence, the adoption of the Mandatory Access Control framework from TrustedBSD, Code signing, and much more. And yes, boys and girls, there are screenshots as well. Update: Apple also launched faster MacBook Pros today. Update II: Screenshots of Leopard from ThinkSecret.