Anti-malware group scolds Apple over Safari 'carpet bomb'
StopBadware.org sees problem as a security issue; Apple doesn't
Computerworld - An anti-malware organization has called on Apple Inc. to beef up its Safari Web browser to protect users from exploits that could let attackers download malicious code to a Mac or Windows user's desktop.
"StopBadware.org believes that users should have control over software being downloaded to their computers, and we encourage Apple to reconsider its stance and treat this as the security issue that it is," StopBadware.org said in an appeal posted to its Web site.
The group's concern centered around an issue made public a week ago by Nitesh Dhanjani, a security researcher and co-author of the book Network Security Tools (O'Reilly Media Inc., 2005). In a post to his own blog last week, Dhanjani spelled out what he called a "carpet bomb" attack possible via Safari.
According to Dhanjani, attackers could take advantage of the fact that Safari lacks an option to require a user's permission to download a file. Those attackers, Dhanjani claimed, could populate a malicious site with rogue code that in turn would automatically litter a user's desktop with malware.
Although Dhanjani praised Apple's security team for its rapid response to his queries, he also noted that the computer and consumer electronics maker passed on updating Safari to lock out such attacks.
After he suggested that Apple add a setting to Safari that could be toggled to ask the user before downloads are allowed, Dhanjani said he received this reply from the company's security group: "The ability to have a preference to 'Ask me before downloading anything' is a good suggestion. We can file that as an enhancement request for the Safari team."
However, the issue is not a security problem, said Apple. "Please note that we are not treating this as a security issue, but a further measure to raise the bar against unwanted downloads," the company said.
Other browsers, including Microsoft Corp.'s Internet Explorer and Mozilla Corp.'s Firefox, include options that prompt users before initiating downloads of some or all file types.
"Assuming Nitesh's analysis is accurate, 'unwanted downloads,' as Apple calls them, represent a serious security threat to users, who can be easily tricked into executing a malicious file," argued StopBadware.org.
The group has rebuked Apple before. In March, when Apple started using its software update utility to push Safari 3.1 to Windows users, StopBadware.org first noted the move, then later said that, following its usual practice, it had notified Apple it would soon issue a "badware" alert for the company's Software Update.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts