While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, researchers at Black Hat say. While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems. While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, researchers at Black Hat say.While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems.Their conclusion is that Apple does pretty well, but Microsoft wins. Even so, earlier versions of Apple’s software were more vulnerable to initial exploitation than Win 7, but the latest Apple version known as Lion makes up ground.CONVERGENCE: Apple to have one OS for Macs and iPads by 2016Escalating privileges remains a problem on both operating systems, he says, with OS X having more potential soft spots than Win 7. But when it comes to network vulnerabilities, Apple is the loser. “OSX networks are significantly more vulnerable to network privilege escalation,” he says. “Almost every OSX server service offers weak or broken authentication mechanisms.” Despite commonly held beliefs that Apple products draw less attention from attackers, some statistics seem to buck that notion, he says. For example, over the past three years, 1,151 common vulnerabilities and exposures (major bugs) have affected Apple products, including third party software. The number for Windows is 1,325, not that much higher, Stamos says.Lion has made strides with the addition of an application sandbox that keeps applications isolated so if malicious executables boot up, they are contained, he says. On the mobile side, independent researcher Dino Dai Zovi, says iOS does a pretty good job running applications in a sandbox. The operating system has a dynamic signing feature for applications in which the device itself has to approve applications before running them, not just accepting the Apple certificate that says they are approved.He says Blackberries have better data protection than iOS, but they lack a sandbox for running applications. He says that Google’s Android mobile operating system is more vulnerable than iOS. Android is about as secure as a jailbroken iPhone that has lost many of its security features by virtue of being jailbroken, he says.Read more about software in Network World’s Software section. Related content feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Intrusion Detection Software Intrusion Detection Software feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe