![]() ![]() So if an attacker is somehow able to make changes to that app without breaking it after the first launch, it could be modified to act as malware. It's also possible to avoid Gatekeeper entirely, but that's a somewhat different issue. The problem with macOS is that we rely on Gatekeeper to prevent such things, but Gatekeeper only thoroughly checks apps on first launch. The attack vector discussions (mostly theoretical) have been ongoing for a couple of years now, but at least on the Mac side have recently been renewed by several macOS security bloggers. Not yet available on iTunes, as of this posting.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |