Data Security

83 Safari Patches: Could Rise of Apple Affect Enterprise Security?

83 Safari Patches: Could Rise of Apple Affect Enterprise Security?
March 13, 2012 11:42AM

Bookmark and Share
"There are a couple of takeaways from this -- the first being that Apple products are 'hacker proof' is a myth," said analyst Marcus Carey. "With the bring-your-own-device movement gaining steam in IT enterprises, there are many organizations that have Apple products appearing in their networks without the tools to manage them."

You have the experience and skills, let an ISACA® certification demonstrate your value. Our certifications announce that you have the expertise and insight to speak with authority. ISACA certification is more than a credential; it's a platform that can elevate your career. Register for an Exam Today.

The "bring your own device" movement is gaining major momentum. That's why Apple's latest round of patches may concern enterprise IT admins.

Apple on Monday updated Safari to version 5.1.4 as it patched a whopping 83 vulnerabilities. It's a record for Safari 5, and the fact that 72 of the flaws were rated critical didn't help ease the concern. The saving grace: None of the vulnerabilities has been exploited in attacks. But mobile industry watchers are still concerned about the ripple effect.

"The consumerization of enterprise mobility -- most visibly manifested by the BYOD trend -- has now moved on to the application front," said Philippe Winthrop, mobility analyst and founder of the Enterprise Mobility Forum. "Organizations are now quickly recognizing the power and value of providing mobile applications to both their employees and their customers. Despite this, many companies are still faced with the challenge of striking the balance between maintaining security and control for IT, while preserving the user-experience of the device for the employee."

Was Apple Pwned?

Although Apple also improved JavaScript performance in its Safari 5.1.4 update, as well as enhanced search field responsiveness, and fixed some interfaces for viewing Flash content after zooming in, most industry watchers are focusing on security.

"Since Safari and Chrome both use WebKit, the open-source browser engine, it allows Apple to reap the benefits of Google's web bounty program, which is responsible for the majority of the Safari WebKit-related fixes," said Marcus Carey, security researcher at Rapid7. "The timing of these patches also comes on the heels of CanSecWest Pwn2Own and Google's Pwnium competitions, where researchers try to research and exploit browser bugs."

Whenever there are new products announced from Apple, people should always expect tons of updates containing security fixes, product enhancements, and of course Apple's ever-changing EULA, Carey said. Shortly after he saw the new iPad announcement, he started noticing prompts for updating software and agreeing to new terms on his Apple products.

"There are a couple of takeaways from this -- the first being that Apple products are 'hacker proof' is a myth. With the bring-your-own-device movement gaining steam in IT enterprises, there are many organizations that have Apple products appearing in their networks without the tools to manage them," Carey said. "Even just allowing employees to install iTunes on their machines exposes the organization to Safari/WebKit vulnerabilities."

Usability vs. Security

According to Forrester Research, 60 percent of U.S. companies have already established bring-your-own-device programs. The knee-jerk reaction among employers is to lock down end-point devices by adding additional security software, restricting functionality, and requiring long and complicated passwords to access the device.

Users, however, don't want to have to enter a password just to access Facebook, be restricted to which apps they can download, or limited in which functions they can use. Smartphone adoption -- the impetus behind BYOD -- has been driven by the user experience, a fact that is forcing companies to look for a new balance between usability and security.

"IT managers are saddled with the task of figuring out how to manage proprietary corporate content without sacrificing security and the end-users' experience with their mobile devices," said Naeem Zafar, CEO and president of Bitzer Mobile. "Device management solutions miss the point. It's not about managing a device; it's about securing the flow of the data."

Tell Us What You Think
Comment:

Name:

Lee:

Posted: 2012-03-14 @ 2:42am PT
I think everyone's missing the point of this article. Apple has had it easy up until now because they had so little of the market, they weren't targeted much. Now that their market share is growing and they're becoming more present in enterprise environments that aren't prepared for them through BYOD schemes, they will be targeted more. These patches have been released, but if they haven't been applied, users are still vulnerable, so in enterprises where there are no systems in place to monitor this, you are exposed. Let's not forget that the exploit that conficker took advantage of had been patched before conficker was released, but unpatched systems meant it still spread.

joberele:

Posted: 2012-03-13 @ 6:54pm PT
This article is best described as a pack of FUD.

PhillyG:

Posted: 2012-03-13 @ 4:23pm PT
I don't understand how installing iTunes creates a security risk if iTunes is only used to communicate with Apple and Apple's iCloud.

GC:

Posted: 2012-03-13 @ 3:36pm PT
Why is it that every story about computer security focuses on the wrong metric. The number of patches is a meaningless number because it does not answer the more important question. How many unpatched vulnerabilities remain? If anything a large number of patches should be considered a good thing since it means that there are that many fewer to worry about.

Anyway, it's the amount of exploits in the wild that is the more meaningful number and in that respect Apple is winning hands down.

Don108:

Posted: 2012-03-13 @ 3:10pm PT
There are over a million pieces of malware for Windows in the field. Many pieces of Windows malware can install and run themselves with no users involvement. Malware for Linux is much better, but still there. There is only a handful of malware for the Mac, and most requires user actions to install and run. Now, Apple has fixed POTENTIAL openings to malware before any was even detected.

Your complaint in this article is like complaining about the quality of a pane of glass in a window while your entire house is burning down.



 Data Security
1. Juniper DDoS for High-IQ Networks
2. Google Hacker Team to Hunt Bugs
3. Cloud Firms Offer Azure Starter Kit
4. FBI Cyber-Expert's Humble Start
5. Chinese Hackers Hit U.S. Officials




 Most Popular Articles
1. Experts Say Four Threats Put Internet Freedom at Risk
2. Gartner Rates Security Solutions in Annual Magic Quadrant Report
3. Google I/O Conference Brings a Lot for Businesses
4. IBM Earmarks $3B for Next-Gen Cloud Computing Chips
5. Focus on Security in New Dell Products, Upgrades

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Juniper DDoS for High-IQ Networks
  Seagate Unveils Networked Drives
  Google Hacker Team to Hunt Bugs
  Cloud Firms Offer Azure Starter Kit
  FBI Cyber-Expert's Humble Start

 Technology Marketplace
Big Data
Unlock your enterprise data's potential. Learn how in the research report.
Are you getting everything you can out of your business data?
 
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
CIO Issues
Secure and retain skilled technology professionals. Learn how.
 
Cloud Computing
Are you getting everything you can out of your business data?
 
Data Storage
Unlock your enterprise data's potential. Learn how in the research report.
 
Enterprise Hardware
Protect your network with APC Smart-UPS battery backup
Cisco UCS Invicta Series flash memory systems
 
Enterprise I.T.
Register for an upcoming ISACA® certification exam today
Secure and retain skilled technology professionals. Learn how.
 
Enterprise Software
Unlock your enterprise data's potential. Learn how in the research report.
 
Hardware
Protect your network with APC Smart-UPS battery backup
Ferocious productivity. A fearless team of pros. Find Out More
Cisco UCS Invicta Series flash memory systems
 
Network Security
Protect your network with APC Smart-UPS battery backup
 
Small Business
Ferocious productivity. A fearless team of pros. Find Out More