Close Menu
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Muse Dash, Hyperforma, Tower of Fortune 4, etc.

March 28, 2025

Best Kitchen Gadgets of 2025

March 18, 2025

The best drawing tablets of 2025: Expert tested and recommended

February 13, 2025
Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
Wtf AndroidWtf Android
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet
Wtf AndroidWtf Android
Home ยป Third-party apps bypass Apple’s security mechanisms
Apps

Third-party apps bypass Apple’s security mechanisms

adminBy adminOctober 18, 2024No Comments1 Min Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


The report notes that in recent years, attackers and security researchers have attempted to bypass gatekeeper mechanisms without the isolation attribute, making macOS more vulnerable to malware.

Malware and adware families such as CoinTicker, Bundlore, and Shlayer use the built-in utility Curl to download their payloads and bypass gatekeepers. The report added that this is because curl does not set the isolation attribute.

Meanwhile, Apple expects third-party application developers to adhere to security guidelines to ensure this scanning mechanism works as intended. However, it has been reported that several archiving tools and applications are non-standard-compliant, which could result in vulnerabilities in the gatekeeper mechanism.

When Unit 42 researchers contacted Apple regarding this security issue, they received the following response: “This issue is best resolved by submitting a report to the third-party app developer. It is up to the developer to implement isolation. This is not an app that we can directly support.

The report suggests that third-party developers must enforce quarantine attributes on all files their applications process to comply with Gatekeeper’s security requirements. Doing so reduces the chance of a malicious gatekeeper being bypassed.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Muse Dash, Hyperforma, Tower of Fortune 4, etc.

March 28, 2025

New Android spyware warning – don’t install these apps

October 31, 2024

Google Apps Finally Adds Material 3 Bottom Bar to Android

October 31, 2024
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Will Google’s new anti-theft feature be a game-changer for Android users?

October 13, 2024

Huawei’s Android replacement HarmonyOS Next launches next week, permanently discontinuing Google’s operating system on existing devices

October 11, 2024

Android 15 lets you turn your phone into a useful smart home dashboard โ€“ here’s how

October 11, 2024

Google ordered to open Android app store to competition

October 10, 2024
Top Reviews
Wtf Android
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 wtfandroid. Designed by wtfandroid.

Type above and press Enter to search. Press Esc to cancel.