Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
The computer operating systems and applications we use today have often evolved over many years, decades even, and contain tens or hundreds of millions of lines of code. Flaws in that code – and there will always be some – give rise to security problems that, in an internet-connected world, are an increasing problem. Many are found in code written in the C++ programming language – in Microsoft Windows, in Java, in applications such as Abode Flash or Reader, the Outlook email client, browsers such as Internet Explorer and Firefox, and increasingly Linux and OS X. Any issues found to affect Linux and other Unix-like operating systems causes problems for Apple because OS X is Unix-like in nature. Apple’s decision to redevelop a new operating system for the Macintosh based on Unix was a momentous one. A family of related operating systems, Unix has evolved since the early 1970s and continues to be used and developed today. Technically OS X is a “Unix-like” operating system called Darwin; Linux is another Unix-like operating system. This decision meant the company could rely on the stability of Unix and focus on the user experience. Will this decision return to bite Apple, however? The flaws now being discovered in Unix-like operating systems also affect OS X. Many bugs are being found that have gone unnoticed for years – the Heartbleed flaw in OpenSSL for example relates to C++ code written by Eric Young in 1998.
Buchanan, W. J. (2014). iWorm hack shows Macs are vulnerable too
Other Type | Newspaper Article |
---|---|
Acceptance Date | Oct 8, 2014 |
Publication Date | Oct 8, 2014 |
Deposit Date | Aug 10, 2015 |
Publicly Available Date | May 15, 2017 |
Keywords | Cybersecurity; Computer programming and software; computer bugs and vurses; Microsoft; Apple |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/8775 |
iWorm hack shows Macs are vulnerable too
(<nobr>530 Kb</nobr>)
PDF
IWorm Hack Shows Macs Are Vulnerable Too
(<nobr>495 Kb</nobr>)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nd/4.0/
A framework for live host-based Bitcoin wallet forensics and triage
(2022)
Journal Article
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
(2022)
Journal Article
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
(2022)
Journal Article
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
(2022)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search