Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
iWorm hack shows Macs are vulnerable too
Buchanan, William J
Authors
Abstract
The computer operating systems and applications we use today have often evolved over many years, decades even, and contain tens or hundreds of millions of lines of code. Flaws in that code – and there will always be some – give rise to security problems that, in an internet-connected world, are an increasing problem. Many are found in code written in the C++ programming language – in Microsoft Windows, in Java, in applications such as Abode Flash or Reader, the Outlook email client, browsers such as Internet Explorer and Firefox, and increasingly Linux and OS X. Any issues found to affect Linux and other Unix-like operating systems causes problems for Apple because OS X is Unix-like in nature. Apple’s decision to redevelop a new operating system for the Macintosh based on Unix was a momentous one. A family of related operating systems, Unix has evolved since the early 1970s and continues to be used and developed today. Technically OS X is a “Unix-like” operating system called Darwin; Linux is another Unix-like operating system. This decision meant the company could rely on the stability of Unix and focus on the user experience. Will this decision return to bite Apple, however? The flaws now being discovered in Unix-like operating systems also affect OS X. Many bugs are being found that have gone unnoticed for years – the Heartbleed flaw in OpenSSL for example relates to C++ code written by Eric Young in 1998.
Citation
Buchanan, W. J. (2014). iWorm hack shows Macs are vulnerable too
Acceptance Date | Oct 8, 2014 |
---|---|
Publication Date | Oct 8, 2014 |
Deposit Date | Aug 10, 2015 |
Publicly Available Date | May 15, 2017 |
Keywords | Cybersecurity; Computer programming and software; computer bugs and vurses; Microsoft; Apple |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/8775 |
Files
IWorm Hack Shows Macs Are Vulnerable Too
(495 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nd/4.0/
iWorm hack shows Macs are vulnerable too
(530 Kb)
PDF
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search