Americas

  • United States

Asia

Oceania

roger_grimes
Columnist

Securityfocus creates Apple-specific security mail list

Analysis
May 31, 20062 mins
Data and Information SecuritySecurity

Apple security gets its own security mail list. The mail list will be dedicated to proactive security steps and security discussions related to the Apple platforms. It will not be used to discuss new vulnerabilities specifically (that will still be done in bugtraq). This is a great idea, especially to remind Apple users that they, too, need to follow good security practices. Send an email message to focus-apple-

Apple security gets its own security mail list.

The mail list will be dedicated to proactive security steps and security discussions related to the Apple platforms. It will not be used to discuss new vulnerabilities specifically (that will still be done in bugtraq).

This is a great idea, especially to remind Apple users that they, too, need to follow good security practices.

Send an email message to focus-apple-subscribe@securityfocus.com

to subscribe.

—————-

Original Announcement from Securityfocus:

Objective

The Focus-Apple mailing list discusses security involving hardware and software produced by Apple or that runs on Apple platforms. Discussion may include security assessment, planning, and implementation for Apple technologies. This list is meant as an aid to network and systems administrators and security professionals who are responsible for implementing, reviewing and ensuring the security of their Apple hosts and applications.

What is appropriate content?

– Discussion of securing Apple hosts in various networked environments, including but not limited to integration with Active Directory or LDAP-based networks.

– Discussion of securing Apple hardware devices such as Airport base stations using wireless technology.

– Experiences in securing specific Apple technologies that would prove valuable to share with the community.

– “How-to” questions surrounding the assessment, implementation, or configuration of Apple technologies, as they relate to security concerns.

– Discussion of tools and/or products that may assist in auditing, securing, and/or patching Apple technologies.

– Follow-up discussion of Apple-related vulnerabilities as it relates to questions about identifying and securing vulnerable hosts and applications.

What is inappropriate content?

– Announcement of security vulnerabilities. (Post this information to Bugtraq)

– Product advertisements.

– Discussion of non-Apple related issues.

– Non-computer/network security related material.

– Discussion of forthcoming product rumours.

How do I subscribe?

Send an email message to focus-apple@securityfocus.com. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer.

roger_grimes
Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.

More from this author