A security researcher has uncovered an exploit that can get around the Mac’s malware gatekeeper. The malware uses a binary file already trusted by Apple to get around the gatekeeper and can then execute malicious files including password loggers, apps that capture audio and video or botnet software, according to Ken Westin, security analyst for Tripwire, a software company that develops, markets and sells information technology solutions that provide security and compliance automation.
“To mitigate the potential damage from the continual barrage of endpoint vulnerabilities organizations need rigorous security analytics,” he says. “The only way to detect anomalous behavior that can indicate a system has been compromised is through the correlation of endpoint and network activity.”
To mitigate the potential damage from the continual barrage of endpoint vulnerabilities organizations need rigorous security analytics, Westin adds. The only way to detect anomalous behavior that can indicate a system has been compromised is through the correlation of endpoint and network activity, he says.