WASHINGTON DC: FireEye has added support for Apple Mac OS and iOS for a variety of its advanced persistent threat (APT) and zero-day defence services. The company added that Apple's 'security by obscurity' model is no longer effective.
FireEye announced the expansion at the MIRcon security conference, claiming to be the first vendor to offer a complete security tool to protect Microsoft, Apple and Google Android platforms from APTs and zero-day targeted attacks.
The roll-out adds support for FireEye's Network Security Threat Prevention Platform (NX series), Forensic Analytics (AX series), Mobile Threat Prevention (MTP) and the Investigation Analysis System (IAS) to Mac OS X and iOS.
The services will offer FireEye customers using Apple a variety of security powers. These include integrated malware analysis, network monitoring for malicious files and activity and an MTP App that will offer cloud-based analysis and intelligence on application behaviour.
The app analytics includes threat scores for iOS apps, detailing their exact malicious or unwanted behaviour. FireEye claims that the features will help Apple customers detect known and unknown attacks, and enable analytics with forensic analysis for Mac OS and iOS products.
FireEye's Advanced Threat Protection NX and AX with OS X support has been rolled out now. FireEye MTP App for iOS is to be released at an unspecified point later this year.
Dave Merkel, FireEye CTO, said the firm released the products after detecting an alarming spike in Mac OS and iOS attacks.
FireEye Labs reportedly saw a 90 percent increase in malware callbacks from Macs from June 2013 to June 2014. Worse still the firm reported in September that it had seen unspecified malware "specifically designed to exploit Mac OS X".
Merkel highlighted the rise as proof that Apple systems are not as secure as most users believe.
"There's a prevailing idea that because Google or Apple is behind [an app] we don't have to worry about it. We just install it and use it. But the app could be directly malicious and hackers could have gotten through the screening process," he said.
"There is nothing in Apple that makes it untouchable, it's a false belief. That's why we're working to secure Apple now."
Apple has a policy of not discussing cyber incidents until they have been fixed, and employs a closed development model that blocks coders from officially making changes to its software or releasing applications on its platform without permission.
The FireEye chief's comments follow the discovery of a fresh cyber campaign targeting Apple Mac OS. Trend Micro researchers reported uncovering a campaign exploiting the Shellshock flaw to infect Mac OS X systems with the Kaiten malware.
Shellshock is a bug in the Bash code used by Unix and Unix-like systems originally uncovered in September.
The bug is believed to be one of the largest ever discovered and could theoretically be used to target everything from servers to the SCADA systems running critical infrastructure.
Insecticides based on sulfoxaflor might be as bad for bees as neonicotinoids
Intel teases forthcoming new graphics card accompanied by the text "We will set our graphics free"
Think your password manager is completely secure? Think again...
ARM plans 7nm 'Deimos' for 2019 and 5nm and 7nm 'Hercules' for 2020