Security Basics mailing list archives

Re: Mac X-Server Security Questions...


From: Javier Blanque <javier () blanque com ar>
Date: Wed, 6 Apr 2005 19:35:37 -0300

You can subscribe to the Apple lists (server admin, security, etc.).
http://lists.apple.com/
http://lists.apple.com/mailman/listinfo
Also you can google for "mac security" or "mac os x exploits".
Apple has been doing its homework about patching and describing the OSX vulns. You should check at:
http://www.apple.com/support/security/
And there are not a lot of unpatched vulnerabilities, even less remote and less 0 day (at least public, against the last 10.3.8 updated with the last security patches). There is no comparison point in the quantity and criticality of Windows and Linux holes, which are several per week, with Mac OS X which is at (up to) several per month.
There are specialized sites on Mac Security such as:
http://www.macsecurity.org/
http://www.securemac.com/
http://members.lycos.co.uk/hardapple/
Recently there have been several announcements and patches released.
There are several administrator and techie Mac sites such as:
http://www.afp548.com/
http://www.macosxhints.com/
Wich could be useful.
Also recently there have been vulnerabilities in open source packages such as PHP-NUKE, and others, which permited defacement of sites, I noticed several hosted on Mac OS X. As it is said, the thing is always broken on the weakest link of the chain. If you know any 0 day exploits for Panther, you must email to Apple at security () apple com.
Best regards,
Javier Blanque


---------------------------------------------------------------------------
Earn your MS in Information Security ONLINE
Organizations worldwide are in need of highly qualified information security professionals. Norwich University is fulfilling this demand with its MS in Information Security offered online. Recognized by the NSA as an academically excellent program, NU offers you the opportunity to earn your degree without disrupting your home or work life.

http://www.msia.norwich.edu/secfocus_en
----------------------------------------------------------------------------


Current thread: