Apple security gets its own security mail list. The mail list will be dedicated to proactive security steps and security discussions related to the Apple platforms. It will not be used to discuss new vulnerabilities specifically (that will still be done in bugtraq). This is a great idea, especially to remind Apple users that they, too, need to follow good security practices. Send an email message to focus-apple- Apple security gets its own security mail list.The mail list will be dedicated to proactive security steps and security discussions related to the Apple platforms. It will not be used to discuss new vulnerabilities specifically (that will still be done in bugtraq). This is a great idea, especially to remind Apple users that they, too, need to follow good security practices. Send an email message to focus-apple-subscribe@securityfocus.com to subscribe.—————- Original Announcement from Securityfocus:ObjectiveThe Focus-Apple mailing list discusses security involving hardware and software produced by Apple or that runs on Apple platforms. Discussion may include security assessment, planning, and implementation for Apple technologies. This list is meant as an aid to network and systems administrators and security professionals who are responsible for implementing, reviewing and ensuring the security of their Apple hosts and applications.What is appropriate content?– Discussion of securing Apple hosts in various networked environments, including but not limited to integration with Active Directory or LDAP-based networks.– Discussion of securing Apple hardware devices such as Airport base stations using wireless technology. – Experiences in securing specific Apple technologies that would prove valuable to share with the community.– “How-to” questions surrounding the assessment, implementation, or configuration of Apple technologies, as they relate to security concerns.– Discussion of tools and/or products that may assist in auditing, securing, and/or patching Apple technologies.– Follow-up discussion of Apple-related vulnerabilities as it relates to questions about identifying and securing vulnerable hosts and applications. What is inappropriate content?– Announcement of security vulnerabilities. (Post this information to Bugtraq)– Product advertisements.– Discussion of non-Apple related issues.– Non-computer/network security related material.– Discussion of forthcoming product rumours.How do I subscribe?Send an email message to focus-apple@securityfocus.com. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe