On 06/10/2010, at 07:19 , Bart Silverstrim wrote: > Nothing on you in particular, I just think that sometimes companies go out of > their way for wacky scenarios that really shouldn't be much of a concern in > the first place while leaving open other more obvious routes of penetration, > and forgetting their biggest security weakness is their users. The > description you're giving is that the user will associate their Mac with a > common AP, the attacker then targets that machine with an OS X exploit to get > rooted, then implant a trojan that then attacks the wired network for...known > files? Spreading a worm?
There's a certain nuclear plant in Iran that would like to have a word to you about your claim of "whacky scenarios that really shouldn't be much of a concern in the first place." Here's another scenario: your (small to medium enterprise) company is involved in a legal wrangle worth millions of dollars to the winning side. The other guys have obtained some malware writing toolkit, which they use to write a virus (or perhaps a Flash ad that exploits a vulnerability in the Flash Player) to look for Pages documents mentioning any of the key words for this case and email them to a mailinator account. The cost of writing a virus is fairly low, compared to the risk of contacting someone and offering them inducements to leak documents, since phone calls are more easily traced than anonymous email. To make the assumption that Mac OS X is immune to malware is to assume that your own faeces do not emit malodorous scents. Alex _______________________________________________ MacOSX-admin mailing list [email protected] http://www.omnigroup.com/mailman/listinfo/macosx-admin
