Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,625
39,503



114652-david_rice.jpg


All Things Digital reports that Apple has hired noted cybersecurity expert and author David Rice to take on the role of director of global security, signaling a continued and growing commitment to security in all aspects of the company and its products. Rice, who formerly held positions with the U.S. Navy and the National Security Agency and is the author of the landmark software security book Geekonomics, is expected to begin working at Apple in March.
Those who know Rice describe him as a deeply respected name in IT security circles who not only can speak the kind of language that makes CIOs comfortable, but can also back up that language with the skills and knowledge to match.

Rice hasn't yet responded to my messages seeking comment, but his bio is fascinating. He's a 1994 graduate of the U.S. Naval Academy and has a master's degree in Information Warfare and Systems Engineering from the Naval Postgraduate School. He served as a Global Network Vulnerability analyst for the National Security Agency and as a Special Duty Cryptologic officer for the Navy.
Rice has spent the past eight years in private industry, primarily serving as a consultant for private sector and government entities, while also serving a consulting director for the U.S. Cyber Consequences Unit in recent years.

Rice is the latest in a series of high-profile security hires made by Apple. The company in 2009 hired Ivan Krstić, former security director for the One Laptop per Child project, and followed that up with the 2010 hiring of Window Snyder, former security chief at Mozilla.

Article Link: Apple Taps Cybersecurity Expert as Director of Global Security
 
Help keep our Macs and iDevices virus free.... and even moreso, anti-virus software free! :)

Good to see Apple putting such focus on this before it becomes a huge problem.
 
Seeing as how iOS 4 was previously jailbroken by visiting a website, beefier security is probably a good thing.
 
sounds like a good choice - curious what his salary comp is and how many/price stock options he will get
 
you mean Apple security will finally get to respectable levels instead of being a joke and one of the worse out there in terms of fixing problems?
 
I, too, hope this results in better security for OS-X and other products. Even though we don't have as many high profile attacks yet I want Apple to stay vigilant and make it as hard as possible for new attacks to be formed.
 
But but Apple says they are the most secure :confused::confused:

most security is measured in terms of zero day exploits. Apple is the worse when it comes to fixing those and they tend to rack up the most of them.

For example 2 weeks is considered fast for Apple. For most others 2 weeks is a very long time. Normal zero day fixes are done in a matter of days for everyone else.
 
most security is measured in terms of zero day exploits. Apple is the worse when it comes to fixing those and they tend to rack up the most of them.

For example 2 weeks is considered fast for Apple. For most others 2 weeks is a very long time. Normal zero day fixes are done in a matter of days for everyone else.

I'm not going to disagree that Apple needs help drastically to actually make the OS secure, and not secure by obscurity, however I have to ask: exactly who patches things faster than 2 weeks? Not always MS. There have been quite a few zero days in 2010 that weren't patched that fast. Google had 80+ vulnerabilities in Android announced late November, and some still aren't patched.

Adobe rarely reacts faster than 30 days, if that.

So I'm curious; who's patching in 2 weeks?
 
This is becoming just a bit too much. They're an electronics company. Who do they really have to fear? If some teenager decides to jailbreak his iPod late at night in his dark bedroom, is some ninja going to come crashing through his bedroom window?

And besides, wouldn't it be cheaper to just hire the dev-team?
 
most security is measured in terms of zero day exploits. Apple is the worse when it comes to fixing those and they tend to rack up the most of them.

For example 2 weeks is considered fast for Apple. For most others 2 weeks is a very long time. Normal zero day fixes are done in a matter of days for everyone else.

False. Microsoft / Google sit on zero day exploits for weeks too.

I'm not going to disagree that Apple needs help drastically to actually make the OS secure, and not secure by obscurity, however I have to ask: exactly who patches things faster than 2 weeks? Not always MS. There have been quite a few zero days in 2010 that weren't patched that fast. Google had 80+ vulnerabilities in Android announced late November, and some still aren't patched.

Adobe rarely reacts faster than 30 days, if that.

So I'm curious; who's patching in 2 weeks?

Exactly. Most Android users can't even patch their device. Definitely NOT in 2 weeks.
 
No, they claim the fewest viruses, which is only true because they haven't been the target of them.
A old synopsis for understanding from Rick, whoever he is:

02/07/08
01:48:09 am, by Rick, 1163 words
Categories: Apple, Microsoft, Unix and Linux, Security
Setting the virus record straight: debunking the market share myth
As Apple continues its slow and steady rise in popularity with consumers, more and more self-appointed security experts on blogs and various tech publications are talking about how the Mac’s operating system, OS X, is not any more inherently secure or safe from viruses and malware than Windows is. The flimsy rationale for this statement (which more often than not comes without any factual support) is that because the Mac’s market share is so small relative to Windows, creators of malware have no interest. Those evil hackers would prefer to get more bang from their coding buck, so to speak, by targeting the largest audience possible with their malware.
Not only is there no evidence to support this assertion, but there actually exists a lot of evidence that counters it. And while I may agree that there is a tiny grain of truth to this argument, it’s not the whole story, not by a long shot. There are many other factors beyond market share that influence a computer platform’s chances of getting viruses or having security exploits.
Oh yes, I hear the anti-Apple crowd out there, sharpening their retorts and readying themselves for battle by hammering away at their Microsoft ergonomic keyboards to produce the ultimate manifesto on Why Steve Jobs is a Hippie Megalomaniac Pouring Kool-Aid Down the Throats of the Misguided Masses and How Apple is Irrelevant and Must Die Die Die. Before we reach that point, just sit back and hear me out.
Let’s look at all the evidence that undermines this market share argument.
One example that is often cited is the situation we have with Web server platforms, specifically the open source Apache versus Microsoft’s Internet Information Services (IIS). For years, Apache has maintained a larger, albeit shrinking, market share compared to that of IIS, and yet, it’s the latter that has historically the most security issues (the most notorious being the Code Red virus). Although the security of IIS has improved dramatically over the last couple of years, it has (and still does by a slim margin) outnumber Apache in terms of security issues. This does not fall into line with the market share argument when trying to explain away viruses.
Bear in mind too that many of the security issues on Windows can be traced back directly to very dumb decisions by Microsoft that have nothing to do with market share: automatically opening attachments in Outlook, leaving ports open by default leading to RPC exploits, sloppy programming resulting in buffer overflows, giving user accounts admin-like privileges, etc. By contrast, Macs have all unnecessary services and ports closed by default and limit user accounts, all of which minimizes the damage that can be inflicted on the system should a bit of malware somehow sneak past the gates.
Here’s another example to consider. Apple’s previous operating system, the Classic Mac OS, never had the market share that their current operating system does, and yet there were viruses for the older operating system. Again, if viruses and security exploits can be explained away by market share arguments, then this should never have happened. Malware creators, so the myth instructs us, couldn’t possibly have had any interest in doing that.
What’s funny about the market share argument too is that it really doesn’t even apply to the Mac to begin with as it assumes the Mac is a platform unto itself. That was true in the old days, but the Mac doesn’t run OS 9 anymore. It’s OS X, and OS X is, underneath the pretty user interface, Unix. There are lots and lots of Unix (or Unix-like, if that makes you Linux fans happy) machines out there and they’re all running the same or similar software under the hood and all have similarities in how they operate and are structured. In that sense, OS X is part of a much bigger market. And yet, I don’t see a whole lot to worry about from the Unix side of OS X either. We’ve seen a few security issues pop up (like the ssh thing a while back) but nothing that has exploded into a major virus outbreak.
One thing that may explain the differences between Unix-like platforms and Windows is the nature of the software that runs on each platform. Much of the software running under-the-hood on Macs is open source. That means anyone, including you and me, can download and look over the source code. When you have lots of programmers looking over the code, security issues can be spotted before they become a headache. This leads to proactive software patching as opposed to reactive—that is, patching after the viruses and malware are running rampant. Windows is closed-source, proprietary software and does not benefit from countless numbers of programmers and hackers viewing its code. In some unfortunate instances, security issues become known only after they have turned into viruses boring holes in your computer’s brain.
With the latest iterations of OS X, Apple has introduced many initiatives to prevent security issues. One of the most interesting is known as address space layout randomization (ASLR) which is more commonly known as memory randomization. ASLR is important because it makes one of the most common security issues, the buffer overflow, almost impossible to exploit.
For those of you who don’t understand it, think of it this way. Imagine the memory of your computer like a map of your hometown. Some vandal wants to change some of the street names to mess with your map. In order for him to do that, he needs to know the exact longitude and latitude of those streets. It’s easy for him because he can buy a map of your hometown and get that same information.
The latest version of OS X chops that map up into little squares and randomly rearranges them, but is also smart enough to know how to continue reading the map unhindered by the confusing rearrangement. Nobody is able to buy a map arranged exactly like that so nobody can get the exact information they need to vandalize your map. It doesn’t mean they can’t. They just can’t quite zero in on exact targets anymore.
On top of that, OS X also offers tagged downloading of applications (a system that watches very closely what gets downloaded and run on your computer and alerts the user before it runs for the first time), stronger forms of built-in encryption, more robust firewall features that watch for malware-like activity and application sandboxing to prevent hackers from targeting program-specific vulnerabilities.
Now, I’m not naive. I have no doubt that OS X will eventually have security issues that result in some kind of malware. No system is perfect and no amount of operating system cheerleading will change that. Someday, we’ll see the first OS X virus. However, I’m confident that these problems will never approach anything like what we’ve seen on Windows, and there’s little reason to think Apple’s gradually increasing market share will change that.
 
^ There's two distinct components to the problem. The number of viruses and the ease of getting them. The first is demonstrably low. The second is also as the text points out, it's simply harder for the malicious code to get access or privileges by default. You have to separate the inherent platform security from the lack of security due to the user. The author admits that market share is likely indeed part of the dearth. I agree with him that the latter problem is likely responsible for the lower infection rate.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.