C/C++/Cocoa tool for codesign security, Developer ID, & Mac App Store Receipt Validation
Tighten Pro - in the Mac App Store
Tighten Pro is now available in the Mac App Store.
Simply click on the icon to the left to purchase directly from Apple.
Or choose PKCS#7Viewer.app by clicking the image to the right.
Mac Developer: iOS apps aren't secure -- what Apple needs to learn from hacking history | VentureBeat | Security | by Minpyo Hong, Seworks
iOS apps aren't secure -- what Apple needs to learn from hacking history | VentureBeat | Security | by Minpyo Hong, Seworks: "This scenario hasn’t actually changed all that much in the mobile era. Hackers still search through binary files to create exploits to gain server access and admin privileges. And all too often, I see iOS developers repeating mistakes we made during the PC and web days, forgetting (or not knowing) to add security measures around every layer of the mobile ecosystem. These developers are under the illusion that the iOS ecosystem is completely safe, or that they don’t need to actively take measures to protect themselves. This is not the case."
Mac Developer: Apple’s iOS 8.3 update blocks access to apps from desktop file managers like iExplorer | 9to5Mac
Apple’s iOS 8.3 update blocks access to apps from desktop file managers like iExplorer | 9to5Mac: "Apple has seemingly moved to block desktop apps that allow users to manage files on their iOS devices in its recent iOS 8.3 update, as noted by MacRumors. Many popular file transfer apps, such as iFunBox, iTools, iExplorer, iBackupBot and PhoneView, have experienced the issue that prevents users from accessing file directories for apps on iOS devices."
Down here, I make the rules!
Mac Developer: Update your Mac: Apple fixes major flaw in OS X Yosemite, but won't patch Lion, Mountain Lion or Mavericks
Update your Mac: Apple fixes major flaw in OS X Yosemite, but won't patch Lion, Mountain Lion or Mavericks: "As a result, OS X users are urged to upgrade to Yosemite version 10.10.3 as soon as possible. Apple will not patch versions older than 10.10, reportedly due to the complexity of the fix."
Enterprise strategy: security alert! Please purchase new hardware immediately! Let's continue to torture 3rd party developers with increasingly complicated sandbox rules. While we open the kimono to hackers. Yay!
Labels: security flaw
Mac Developer: Meet Anonymous International, the hackers taking on the Kremlin | World news | The Guardian
Meet Anonymous International, the hackers taking on the Kremlin | World news | The Guardian: "...a member of Anonymous International, better known as Shaltai Boltai (Humpty Dumpty in Russian), arguably the most famous hacker group in the country after claiming responsibility for a series of high-profile leaks."
The brave new economy.
Mac Developer: Controversial torrent app Popcorn Time comes to non-jailbroken iPhones by skipping App Store | 9to5Mac
Controversial torrent app Popcorn Time comes to non-jailbroken iPhones by skipping App Store | 9to5Mac: "Users will have to download ‘iOS installer’ software to their Windows or Mac desktop (Mac support is arriving in the coming weeks), connect their iOS device using a USB cable and follow onscreen instructions to complete the installation. This means they are evading the normal App Store installation process, although the details are not clear."
Fascinating! I think of all the time I've wasted learning about the sandbox every time a hacker announces a root kit that can be implemented on a webpage.
Mac Developer: A Look Inside the Ask Toolbar Installed with Java for Mac | The Mac Security Blog
A Look Inside the Ask Toolbar Installed with Java for Mac | The Mac Security Blog: "Java and Ask Toolbar Installation Process
At the beginning of the installation process, the Java installer creates a temporary helper, com.oracle.JavaInstallHelper, in /Library/PrivilegedHelperTools/"
The battle for your desktop from a language technology nobody wants on the desktop (except Android devs).
Labels: android, android vs. ios, app security, security flaw
Mac Developer: China reportedly defers banking technology regulations, relieves pressure on foreign firms
China reportedly defers banking technology regulations, relieves pressure on foreign firms: "Citing an unnamed U.S. official, Reuters reports U.S. Treasury Secretary Jack Lew met with Chinese officials, including Premier Li Keqiang, in Beijing presumably to discuss concerns over security measures designed to protect state-backed banking institutions from outside threats.
Code security doesn't go any higher than this.
Labels: secure coding mac, security, security law
Mac Developer: Woz says Apple would never hire him or Steve Jobs today | Cult of Mac
Woz says Apple would never hire him or Steve Jobs today | Cult of Mac: "Steve Wozniak thinks he and co-founder Steve Jobs could never have found employment at the company they created together, had they been in their twenties in 2015.
‘I look at the experience and education levels you need to get a job at Apple today and I think, ‘Well, Steve Jobs and I never could’ve gotten a job at Apple today,'’ Woz told The Australian Financial Review in an interview."
But they wouldn't need to because they could download Xcode and spend $100 to enroll in an Apple developer program and start their own company that way. It's the eco-system, silly.
Mac Developer: Google warns of fake digital certificates issued for its domains and potentially others (Updated) | VentureBeat | Security | by Dylan Tweney
Google warns of fake digital certificates issued for its domains and potentially others (Updated) | VentureBeat | Security | by Dylan Tweney: "Google revealed today that it has discovered several fake digital certificates for some of its domains.
That’s bad, because any browser accessing these domains via transport layer security (TLS; the latest security protocol, and a successor to SSL) counts on a certificate in order to be sure that it’s connecting with the real McCoy, not some imposter."
Everything is going to be stress tested in ways that can't even imagine.
Labels: security, security flaw
Mac Developer: Apple's Safari among browsers taken down at Pwn2Own day 2
Apple's Safari among browsers taken down at Pwn2Own day 2: "South Korean security researcher Jung Hoon Lee toppled Safari with a use-after-free vulnerability, according to Threatpost. Lee was then able to bypass Safari's sandbox thanks to an uninitialized stack pointer, with the combined exploits netting him some $50,000 in prize money."
It's unfortunate, but the lazy code of browser-writers penalize everyone else who must spend months reworking application software to work within the confines of increasingly restrictive security sandboxes.
It's the browser. And apps that thinly wrap the browser (read: Facebook).
Labels: app security, security flaw
Mac Developer: Apple reportedly cracks down on antivirus apps from iOS App Store, many apps pulled | 9to5Mac
Apple reportedly cracks down on antivirus apps from iOS App Store, many apps pulled | 9to5Mac: "One casualty of the removal is Intego’s VirusBarrier, which claims that this takedown was not specific to its product with Apple deciding the entire category of antivirus products is now off-limits."
I like the fact that Apple is fairly lax about editorializing App Store content, but it would be good if the app store became organized around search because otherwise in the long term, Google will be used to find apps in the store.
Labels: app security, app store
Mac Developer: Hundreds of iOS apps vulnerable to HTTPS-based FREAK attack
Hundreds of iOS apps vulnerable to HTTPS-based FREAK attack
Security researchers at FireEye recently went through thousands of iOS and Android apps and found that while a bulk are not vulnerable to the "FREAK" (Factoring RSA Export Keys) attack, a significant number are, reports Ars Technica.
Internal app security is the next frontier of security.
Labels: secure coding mac, security flaw
Mac Developer: Who's afraid of the Apple Watch?
Who's afraid of the Apple Watch?: "When experts at Bluebox Security examined a series of holiday-promoted Android products being sold in the U.S. at major retailers including Target and Walmart, it found that virtually every one of them was contaminated by malware or wide open vulnerabilities, in some cases with apparent malice involved, in the same fashion as Lenovo's intentional, ROI-motivated installation of Superfish advertising malware on its Windows notebooks."
It's not always good to lead in a category.
Labels: security flaw
Mac Developer: CIA has waged 'secret campaign' to crack Apple's iOS security - report
CIA has waged 'secret campaign' to crack Apple's iOS security - report: "Classified documents released by whistleblower Edward Snowden reveal that the Central Intelligence Agency has been engaged in a multi-year coordinated effort to crack the security of Apple's iOS platform, which powers and protects the iPhone and iPad."
If they were smart, they'd join forces with the NSA. Love that compartmentalization!
Mac Developer: Security firm finds preinstalled malware on Xiaomi Mi 4 smartphone | VentureBeat | Security | by Ruth Reader
Security firm finds preinstalled malware on Xiaomi Mi 4 smartphone | VentureBeat | Security | by Ruth Reader: "Data security firm Bluebox has discovered preinstalled malware and a host of other issues with a Xiaomi Mi 4 device the company tested. Scarier still, the phone seems to have been tampered with by an unidentified third party."
Brave new world.
Labels: android vs. ios, security flaw
Mac Developer: Researchers Find New 'FREAK' Security Flaw, Apple Says Fix Coming Soon - Mac Rumors
Researchers Find New 'FREAK' Security Flaw, Apple Says Fix Coming Soon - Mac Rumors: "Researchers have recently uncovered a major security flaw in software created by companies like Google and Apple, leaving many devices vulnerable to hacking attempts, reports The Washington Post. Called 'FREAK' (Factoring Attack on RSA-EXPORT Keys), the vulnerability stems from a U.S. government policy that once prevented companies from exporting strong encryption, requiring them to instead create weak 'export-grade' products to ship to customers outside of the United States. "
US policy, the gift that keeps on giving!
Labels: security, security law
Mac Developer: Cook teases ‘ton’ of Apple Watch announcements, including Panera Bread, Salesforce enterprise & fitness apps | 9to5Mac
Cook teases ‘ton’ of Apple Watch announcements, including Panera Bread, Salesforce enterprise & fitness apps | 9to5Mac: "In addition to discussing the international Apple Watch launch and accessibility efforts at a briefing in Germany, Apple CEO Tim Cook teased ‘a whole ton of announcements coming shortly about all of the apps coming’ for the Apple Watch, according to employees in attendance. Cook first highlighted the use of the Apple Watch in hotels by saying that ‘some of the best hotels in the world’ will allow Apple Watch users to use the wearable to unlock room doors."
Sounds like a good thing. Although I would worry that an unconscious person's finger can be used to unlock their iPhone TouchID. By unconscious, I mean sleeping.
Labels: security, touch ID
Mac Developer: After Superfish scandal, Lenovo vows less bloatware and to be 'leader in cleaner, safer PCs' | VentureBeat | Business | by Paul Sawers
After Superfish scandal, Lenovo vows less bloatware and to be 'leader in cleaner, safer PCs' | VentureBeat | Business | by Paul Sawers: "Fresh from the Superfish scandal that saw some of its PCs subjected to horrible preloaded software that compromised user security, Lenovo is trying to win brownie points by vowing to ‘significantly reduce’ its preloaded software, commonly known as ‘bloatware.’"
It came from the East!
Labels: security flaw
Mac Developer: The Safe Mac » OpinionSpy is back!
The Safe Mac » OpinionSpy is back!: "yesterday, I found an installer on CNET’s Download.com containing a new variant of the OpinionSpy malware. "
Good news is that xprotect has been updated to protect against it.
Mac Developer: Apple to require all Mac App Store submissions to ditch garbage collection, switch to ARC on May 1st | 9to5Mac
Apple to require all Mac App Store submissions to ditch garbage collection, switch to ARC on May 1st | 9to5Mac: "Apple has announced on its developer site that apps submitted to the Mac App Store starting on May 1st will no longer be allowed to incorporate garbage collection, which was deprecated in OS X 10.8. Instead, developers will be required to switch to ARC, which was introduced in 10.7."
In some ways, this is hilarious. I took one look at GC and in my own mind "never in my apps, but if you want to, good luck with that". I feel the same way about ARC, which is a performance SUCK.
Labels: ARC vs GC
Mac Developer: Microsoft Pushes Patches for Dozens of Flaws — Krebs on Security
Microsoft Pushes Patches for Dozens of Flaws — Krebs on Security: "The bulk of the flaws (41) addressed in this update apply to Internet Explorer, the default browser on Windows. This patch should obviously be a priority for any organizations that rely on IE. Other patches fix bugs in the Windows OS itself and in various versions of Microsoft Office. A full breakdown of the patches is available here."
Maybe that Google arm wrestle is working after all.
Labels: security flaw
Mac Developer: The 3 Hottest Physical Security Products at CES 2015 | The Mac Security Blog
The 3 Hottest Physical Security Products at CES 2015 | The Mac Security Blog: "You already know where to turn for the best Mac security products on the planet. But as any good security practitioner will tell you, it's important to take a layered approach to security."
Love the Noke padlock, would hate if it ran out of battery power!
Mac Developer: OS X 10.10.2 will fix years-old Thunderbolt hardware vulnerability
OS X 10.10.2 will fix years-old Thunderbolt hardware vulnerability: "The so-called 'Thunderstrike' hardware exploit was publicized late last year, but the hack takes advantage of a flaw in the Thunderbolt Option ROM first disclosed in 2012. Until now, that flaw hasn't been patched, but according to iMore, the latest beta of Apple's OS X 10.10.2 update fixes the problem."
Labels: security fix, security flaw, thunderstrike
Mac Developer: Twitter’s war on developers continues: Tweetbot for Mac falls victim to token limit, gets pulled from App Store | 9to5Mac
Twitter’s war on developers continues: Tweetbot for Mac falls victim to token limit, gets pulled from App Store | 9to5Mac: "In November, 9to5Mac brought you an exclusive interview on Twitter’s limitations on third-party developers with the Iconfactory’s Gedeon Maheux. In the original article, Maheux said that development on Twitterrific 5 for Mac had stalled due to Twitter’s strict limits on how many users can login to a particular application."
All in good fun until somebody loses an eye.
Labels: devwars, twitter
Mac Developer: Google's Project Zero reveals three new zero-day exploits in Apple's OS X [u]
Google's Project Zero reveals three new zero-day exploits in Apple's OS X [u]: "An internal software security research team at Google has publicly revealed three of recently-discovered zero-day exploits in Apple's Mac OS X desktop operating system, though the severity of each vulnerability is unknown."
Don't like the sound of sandbox escape via XPC.
Labels: security flaw, XPC service
Mac Developer: Security bug Heartbleed may be forgotten, but it's not gone | VentureBeat | Security | by Ruth Reader
Security bug Heartbleed may be forgotten, but it's not gone | VentureBeat | Security | by Ruth Reader
However, a new bill called the Cyber Supply Chain Management and Transparency Act of 2014, would require software makers to provide a bill of materials for all the code components used in the software.
Obviously, bureaucracy will provide a solution that software engineers themselves cannot provide. Right.
Mac Developer: What Blackhat Gets Right: A Chat With Former Hacker Kevin Poulsen
What Blackhat Gets Right: A Chat With Former Hacker Kevin Poulsen: "Back in Kevin Poulsen's hacker days, before he became writer and Wired editor, he pulled stunts like taking over the phone lines in a radio contest to win himself a Porsche, or breaking into the FBI's computer system when he ended up on the agency's Most Wanted list to change his physical description. He served a five-year sentence for his crimes. Now he's consulting for Hollywood hacker films."
It's an interesting plot, low on tech details that runs toward an ever-closing noose. Instead of ever heightening public stakes. I enjoyed it.
Labels: blackhat, hacker movie