Lock and Code

How Apple fixed what Microsoft hasn't, with Thomas Reed


Listen Later

Earlier this month, a group of hackers was spotted using a set of malicious tools—that originally gained popularity with online video game cheaters—to hide their Windows-based malware from being detected.

Sounds unique, right? 

Frustratingly, it isn't, as the specific security loophole that was abused by the hackers has been around for years, and Microsoft's response, or lack thereof, is actually a telling illustration of the competing security environments within Windows and macOS. Even more perplexing is the fact that Apple dealt with a similar issue nearly 10 years ago, locking down the way that certain external tools are given permission to run alongside the operating system's critical, core internals. 

Today, on the Lock and Code podcast with host David Ruiz, we speak with Malwarebytes' own Director of Core Tech Thomas Reed about everyone's favorite topic: Windows vs. Mac. But this isn't a conversation about the original iPod vs. Microsoft's Zune (we're sure you can find countless, 4-hour diatribes on YouTube for that), but instead about how the companies behind these operating systems can respond to security issues in their own products. Because it isn't fair to say that Apple or Microsoft are wholesale "better" or "worse" about security. Instead, they're hampered by their users and their core market segments—Apple excels in the consumer market, whereas Microsoft excels with enterprises. And when your customers include hospitals, government agencies, and pretty much any business over a certain headcount, well, it comes with complications in deciding how to address security problems that won't leave those same customers behind. 

Still, there's little excuse in leaving open the type of loophole that Windows has, said Reed:

"Apple has done something that was pretty inconvenient for developers, but it really secured their customers because it basically meant we saw a complete stop in all kernel-level malware. It just shows you [that] it can be done. You're gonna break some eggs in the process, and Microsoft has not done that yet... They're gonna have to."

Tune in today.

You can also find us on Apple PodcastsSpotify, and whatever preferred podcast platform you use.

For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License

http://creativecommons.org/licenses/by/4.0/

Outro Music: “Good God” by Wowa (unminus.com)

...more
View all episodesView all episodes
Download on the App Store

Lock and CodeBy Malwarebytes

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

42 ratings


More shows like Lock and Code

View all
Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

32,011 Listeners

WSJ Opinion: Potomac Watch by Paul Gigot, The Wall Street Journal

WSJ Opinion: Potomac Watch

2,836 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,010 Listeners

Talking Real Money - Investing Talk by Don McDonald

Talking Real Money - Investing Talk

758 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,024 Listeners

The Clark Howard Podcast by Clark Howard

The Clark Howard Podcast

5,450 Listeners

Click Here by Recorded Future News

Click Here

418 Listeners

Bold Names by The Wall Street Journal

Bold Names

1,446 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

All-In with Chamath, Jason, Sacks & Friedberg

9,938 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

139 Listeners

What the Hack? by DeleteMe

What the Hack?

221 Listeners

The 404 Media Podcast by 404 Media

The 404 Media Podcast

386 Listeners

The Kim Komando Show by Kim Komando

The Kim Komando Show

160 Listeners

Decoding Retirement by Yahoo Finance

Decoding Retirement

21 Listeners