This just in since there's a Mac thread going....
John W. Cook
Systems Administrator
Partnership For Strong Families
Sent to you from my Blackberry in the Cloud

________________________________
From: Threat Monitor
To: John Cook
Sent: Thu Jun 04 13:05:14 2009
Subject: A new era of Mac hacks?


        June 04, 2009           Published by    
SearchSecurity.com<http://go.techtarget.com/r/7441194/1852829>



 Current Threats

[http://media.techtarget.com/searchSecurity/images/header_logo.gif]<http://go.techtarget.com/r/7441195/1852829>






Mac OS memory flaws pose challenges for enterprise endpoint 
protection<http://go.techtarget.com/r/7441196/1852829>

Dee-Ann LeBlanc, Contributor


At the recent Source Boston security conference, researcher Dino Dai Zovi 
shared a presentation on the hackability of Mac OS X that's caused quite a stir.

According to Dai Zovi, a noted author and Mac security expert, easy access to 
the root memory in Apple Inc.'s operating system makes it trivial for malicious 
attackers to take over a Mac system, establish a TCP connection and download 
additional malicious code.
Read more<http://go.techtarget.com/r/7441197/1852829>
Get this tip via our RSS feed<http://go.techtarget.com/r/7441198/1852829>
Listen to this tip on your favorite mp3 
player<http://go.techtarget.com/r/7441199/1852829>

ALSO ON SEARCHSECURITY.COM

Interview with Macbook hacker Dino Dai 
Zovi<http://go.techtarget.com/r/7441200/1852829>
Macbook hacker and financial services industry consultant Dino Dai Zovi knows 
security from both sides. In this Information Security magazine interview, he 
discusses his Mac exploits and his efforts toward quantifying enterprise risk.
Also, check out this video on the Mac OS 
attack<http://go.techtarget.com/r/7441201/1852829>

Sign up for more e-newsletters from 
SearchSecurty.com<http://searchsecurity.techtarget.com/tieredRegPage/1,294138,sid14,00.html?track=NL-427&ad=705975>
SearchSecurity.com offers many timely and informative newsletters. Sign up 
today for our monthly Risk Management Strategies tip, covering the intersection 
of business risk and security program management.
Edit your preferences to sign up for all our 
newsletters!<http://go.techtarget.com/r/7441202/1852829>






          ADVERTISEMENT



Must-Have Resources for IT Security Pros
<http://go.techtarget.com/r/7441203/1852829>
Take advantage of all SearchSecurity.com has to offer:

 *   Expert webcasts, podcasts and 
videos<http://go.techtarget.com/r/7441204/1852829>

 *   Online security schools offering CPE 
credits<http://go.techtarget.com/r/7441205/1852829>

 *   IT Security RSS feeds<http://go.techtarget.com/r/7441206/1852829>

 *   IT security technical tips<http://go.techtarget.com/r/7441207/1852829>

 *   And more!<http://go.techtarget.com/r/7441208/1852829>












        [http://media.techtarget.com/digitalguide/images/Misc/nl_itke_logo.gif]

Need current threat advice and answers? Ask your own 
question<http://go.techtarget.com/r/7441209/1852829> or browse thousands of IT 
answers on IT Knowledge Exchange.








ABOUT THIS E-NEWSLETTER



        
[http://searchtechtarget.techtarget.com/images/ttlogofooter_white-lg.gif]       
        Get Information Security magazine? Answer 12 quick questions and start 
a FREE subscription:
http://www.omeda.com/cgi-win/insec.cgi?mode=lgad&p=YHL87<http://go.techtarget.com/r/7441210/1852829>

This e-newsletter is published by SearchSecurity.com, part of the TechTarget 
network. TechTarget provides IT professionals with the resources they need to 
perform their jobs: Web sites, newsletters, forums, blogs, white papers, 
webcasts, events and more.

Copyright 2009 TechTarget<http://go.techtarget.com/r/7441211/1852829>. All 
rights reserved. Designated trademarks and brands are the property of their 
respective owners.

We're sending you this information based on the Topics you selected in your 
TechTarget Member Profile. To unsubscribe, click 
here<http://searchSecurity.techtarget.com/u?track=NL-427&em=john.cook%40pfsf.org&uid=1852829&eid=705975&;>.

Unsubscribe requests may take up to 24 hours to process; you may receive 
additional mailings during that time. A confirmation e-mail will be sent when 
your request has been successfully processed.

Please note, this will not affect any other subscriptions you have signed up 
for.

Contact Us:
SearchSecurity.com
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494
Contact: [email protected]<mailto:[email protected]>

When you access content from this newsletter, your information may be shared 
with the sponsors or future sponsors of that content as described in our 
Privacy Policy: PRIV LINK<http://go.techtarget.com/r/7441212/1852829>






________________________________
CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
Consider the environment. Please don't print this e-mail unless you really need 
to.

This email and any attached files are confidential and intended solely for the 
intended recipient(s). If you are not the named recipient you should not read, 
distribute, copy or alter this email. Any views or opinions expressed in this 
email are those of the author and do not represent those of the company. 
Warning: Although precautions have been taken to make sure no viruses are 
present in this email, the company cannot accept responsibility for any loss or 
damage that arise from the use of this email or attachments.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to