Mon, Feb 24, 2014 - Page 15 News List

Apple promises Mac hacker fix ‘very soon’

HIDDEN RISK:The bug that was first found in iPhones and iPads and now in Macs has been present for months, researchers who tested earlier software versions said


Apple Inc said on Saturday that it would issue a software update “very soon” to cut off the ability of spies and hackers to grab e-mail, financial information and other sensitive data from Mac computers.

Confirming researchers’ findings late on Friday that a major security flaw in iPhones and iPads also appears in notebook and desktop machines running Mac OS X, Apple spokeswoman Trudy Muller told reporters: “We are aware of this issue and already have a software fix that will be released very soon.”

Apple released a fix on Friday afternoon for the mobile devices running iOS, and most should update automatically.

Once that fix came out, experts dissected it and saw the same fundamental issue in the operating system for Apple’s mainstream computers.

That started a race, as intelligence agencies and criminals will try to write programs that take advantage of the flaw on Macs before Apple pushes out the fix for them.

The flaw is so odd in retrospect that researchers faulted Apple for inadequate testing and some speculated that it had been introduced deliberately, either by a rogue engineer or a spy.

Former US intelligence operatives said that the best “back doors” often look like mistakes.

Muller declined to address the theories.

“It’s as bad as you could imagine, that’s all I can say,” Johns Hopkins University cryptography professor Matthew Green said.

Adam Langley, who deals with similar programming issues as a Google engineer, wrote on his personal blog that the flaw might not have shown up without elaborate testing.

“I believe that it’s just a mistake and I feel very bad for whomever might have slipped,” he wrote.

The problem lies in the way the software recognizes the digital certificates used by banking sites, Google’s Gmail service, Facebook and others to establish encrypted connections.

A single line in the program and an omitted bracket meant that those certificates were not authenticated at all, so that hackers can impersonate the Web site being sought and capture all the electronic traffic before passing it along to the real site.

In addition to intercepting data, hackers could insert malicious web links in real e-mails, winning full control of the target computer.

The intruders do need to have access to the victim’s network, either through a relationship with the telecom carrier or through a WIFI wireless setup common in public places.

Industry veterans warned users to avoid unsecured WI-FI until the software patch is installed.

The bug has been present for months, according to researchers who tested earlier versions of Apple’s software.

No one had publicly reported it before, which means that any knowledge of it was tightly held and that there is a chance it had not been used.

Documents leaked by former US intelligence contractor Edward Snowden showed US agents boasting that they could break into any iPhone, and that had not been public knowledge either.

Apple did not say when or how it learned about the flaw in the way iOS and Mac OS handle sessions in what are known as secure sockets layer or transport layer security. Those are shown to users by the Web site prefix “https” and the symbol of a padlock.

Comments will be moderated. Keep comments relevant to the article. Remarks containing abusive and obscene language, personal attacks of any kind or promotion will be removed and the user banned. Final decision will be at the discretion of the Taipei Times.

TOP top