Apple to talk iOS security at Black Hat conference

“In the 15 years that computer hackers have gathered in Las Vegas for the Black Hat conference, an event where unknowns can become stars and tech heavyweights are skewered for security failures, one company has been noticeably absent: Apple,” Jordan Robertson reports for Bloomberg.

“While many major technology vendors have overcome their reluctance to making a public showing at the conference, Apple, now the world’s most valuable company, has had no problem snubbing a community whose aim is to unearth its vulnerabilities,” Robertson reports. “That will change Thursday when Dallas De Atley, manager of Apple’s platform security team, is scheduled to give a presentation on key security technologies within iOS, the operating system for iPhones and iPads.”

Robertson reports, “Trey Ford, Black Hat’s general manager, said it will be the first time an Apple representative has taken the stage at Black Hat or its sibling conference, DefCon. Apple’s security researchers have lurked the halls at Black Hat and other conferences. But the closest anyone has come to seeing someone from Apple speak on stage was 2008. That’s when a panel of Apple insiders was scheduled to give a talk about the company’s security-response team. The highly anticipated event was abruptly canceled when Apple’s marketing department caught wind of it, according to Ford. ‘Bottom line — no one at Apple speaks without marketing approval,’ Ford wrote in an e-mail. ‘Apple will be at Black Hat 2012, and marketing is on board.'”

Read more in the full article here.

[Thanks to MacDailyNews Readers “Fred Mertz” and “Dan K.” for the heads up.]


    1. I’ve only know newbies and trolls to ever state the mythological line of ‘we don’t need no stinkin’ security’. The line was use far more often as a trolling tool than as actual evidence of vehement Mac user ignorance.

      As a former board member and frequent speaker about computer security at the local Windows PC user group, I can tell you exactly which platform is required to have live running anti-malware 24/7 and why. But I also point out to every Mac user I can lay my hands on that the drive-by Java infection version of the Flashback malware makes it clear that every computer user on every platform is required to be security aware. 600,000 infected Macs makes a big impression.

  1. There are a few points where Apple will get skewered at Black Hat regarding iOS security:

    1) The ‘Find and Call’ Trojan app that snuck through Apple’s vetting system.

    2) The ‘Instaquotes-Quotes Cards for Instagram’ app discovered today to contain the Windows worm Win32/VB.CB. It inadvertently also made it through Apple’s vetting system.

    3) The scary story that an iOS crack was recently sold to the US federal government for around $250,000. The nature of this crack, if it actually exists, is unknown. That’s not good.

    (Of course, if the tale is true, It’s also not good that our own US federal government is hell bent on surveilling iOS using US citizens on US soil without court warrants, seeing as such surveillance is entirely unconstitutional. I consider these surveillance maniacs to be plain old traitors who belong in prison. Do you read me MPAA, RIAA, US Chamber of Commerce and other Corporate Oligarchs?).

    [I left source links out of this post in order to keep WordPress happy.]

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.