The 15th annual Black Hat conference in Las Vegas for hackers, saw Apple making a first time appearance. The conference looks at online security issues, and if devices and OS’s represent an easy path for hackers.
But the Cupertino tech giant’s much awaited appearance at the conference left most disappointed.
According this Bloomberg report,
Dallas De Atley, who manages Apple’s platform security team, drew a crowd of more than 500 for his hour-long talk on the security technologies the company has built into iOS, the operating system for iPhones and iPads.
Yet for all of the symbolic significance of having the world’s most valuable company engaging with hackers bent on finding flaws in its products, there wound up being little new information from the presentation.
Hacking attacks on mobile devices, such as Apple iOS run iPods, iPads and iPhone or Android smartphones were the core issues discussed at the conference. But Android, wasn’t so lucky at the conference as it was proved that Google’s prized mobile OS was vulnerable to hacker attacks.
Apple, which has always claimed to take OS security as its number priority, disappointed hackers at the conference by not providing any new information regarding security. De Atley also refused to take any questions from audiences.
De Atley pointed out that In order to minimize the attack profile Apple has stripped out all unnecessary software from iOS, with all unnecessary tools removed and no remote login support or shell.
But is Apple’s security so unbreakable? Not so as the hackers at the conference pointed out. The New York Times reports, that in a separate session, hackers elsewhere were delivering a simultaneous presentation titled “The Dark Art of iOS Application Hacking.”
Apple products such as Macs were previously advertised as ‘doesn’t get PC viruses.’ The tagline has now changed to ‘Built to be safe.’ Probably because this April Apple’s prized Macs were infected with a malware called Flashback which stole personal information. Nearly 600,000 Macs were infected with the Malware.