Apple changes OS X security messages
- 18 June, 2012 14:44
Apple removed the previous statement "It doesn’t get PC viruses" and replaced it with "It’s built to be safe", and "Safeguard your data. By doing nothing" with "Safety. Built in". A comparison of the old and new messages is currently available here.
According to Sophos US senior technology consultant Graham Cluley, this is a sign that Apple is starting to take security seriously.
“I view the changes in the messages pushed out by their marketing department as some important baby-steps,” he wrote in a blog entry.
“Let's hope more Apple Mac owners are also learning to take important security steps--such as installing anti-virus protection.”
In addition to changing its marketing messages, Apple has released a security guide for the iPhone operating system iOS and announced in February that OS X 10.8, or Mountain Lion, would include a new feature called Gatekeeper that would restrict which applications users can install on their devices.
Cluley is not the only security expert who has urged Apple to improve its OS protection.
In a recent interview with Computerworld Australia, Kaspersky Lab co-founder Eugene Kaspersky said the company needed to extend time frames for supporting older operating systems. For example, in May this year Apple ended support for OS X 10.5, also known as Leopard, when OS X 10.7 was released.
“Apple has stopped supporting some older operating systems but there are still millions of people using these systems,” he said. “It means if vulnerabilities are found, any kind of bad guys will be free to infect these machines.”
Apple Australia was contacted by Computerworld Australia but declined to comment.
Follow Hamish Barwick on Twitter: @HamishBarwick
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
BYOD and Beyond - Implementing a Unified Access Solution
The rise of BYOD programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace. Whether you are contemplating the creation of a BYOD program or currently trying to establish one, this fact cannot be overstated. Find out how to overcome these challenges.