Language Selection

English French German Italian Portuguese Spanish

Apple's Intel switch doesn't spell security doom

Filed under
Mac

Apple's switch to Intel chips does not spell the start of Windows PC-style security problems for Macs, experts say.

Macs will have the same hardware at their core as Windows PCs but it is the operating system, not the hardware, that has made those Microsoft-based computers vulnerable to attacks, analysts and security researchers said.

Dana Gardner, a senior analyst at research firm the Yankee Group, said: "Mac OS has generally a better track record and reputation than Windows for security. I don't think taking Mac OS to Intel silicon would change the robustness of the operating system."

The Mac OS enjoys a reputation as a secure operating system, with far fewer flaws than Windows. So far, it has largely been immune to the worms and viruses that have hit Microsoft-based systems. That is unlikely to change with the shift announced on Monday from niche Power PC processors to mainstream Intel hardware.

Theoretically, though, it is possible that security flaws in lower-level system software could be used to attack both Windows and Mac computers, several security experts said. However, such attacks, for example on the system BIOS, are rare. Furthermore, it is not known if Apple will use the same low-level software common in Windows PCs, the experts said.

Another unknown is to what level Intel will customise its chip products for Apple.

Russ Cooper, a senior scientist at security provider Cybertrust of Herndon, said: "The fact that Macs are running the same processors as Windows PCs may mean that some code can be executed on both platforms. But I don't think that virus writers are writing at that level, so it is probably not going to have any security implications."

Full Story.

More in Tux Machines

Healthdirect Australia sees value in open source for security solution

Commonwealth and state/territory government funded public company, Healthdirect Australia, has used open source software to build an identity and access management (IAM) solution. The IAM solution allows users to have one identity across all of its websites and applications. For example, users can sign in using their Facebook, LinkedIn or Gmail account. Read more

Ubuntu Installer Bug Can Delete Your Hard Drive and All Other OSes

The Ubuntu installation procedure is governed by a piece of software called Ubiquity and it's one of the most intuitive and easy-to-use installers on the Linux platform. Unfortunately, users have been confronting with a bug that could wipe their entire hard-driver without any kind of announcement. Read more

You have your Windows in my Linux

Although there are those who think the systemd debate has been decided in favor of systemd, the exceedingly loud protests on message boards, forums, and the posts I wrote over the past two weeks would indicate otherwise. I've seen many declarations of victory for systemd, now that Red Hat has forced it into the enterprise with the release of RHEL 7. I don't think it's that easy. Read more

7 Things You Can Do With The Xposed Framework on a Rooted Android Phone or Tablet

The Xposed Framework is a way to make system-level changes to your Android operating system without installing a custom ROM. All you need is root access. Here’s a look at what you can actually do with the Xposed Framework. You’ll find all of these modules listed in the Xposed Framework itself. Install the Xposed Framework, open it, and use the Modules search to browse, search, and install modules. Read more