Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Does Apple Need Ten Years of Trustworthy Computing?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Does Apple Need Ten Years of Trustworthy Computing?
Security

Does Apple Need Ten Years of Trustworthy Computing?

AlexOlesker
AlexOlesker
4 Min Read
SHARE

Researchers at Kapersky Lab recently concluded that Apple is an entire decade behin

Researchers at Kapersky Lab recently concluded that Apple is an entire decade behind Microsoft at malware protection, pointing to the spate of Flashback attacks and Apple’s slow response. Kapersky  predicting a coming wave of malware as OSX viruses, once rare, grow to be as common as those aimed at Windows. Microsoft, by contrast, has been struggling with malware since its inception and has developed a system of responses and initiatives known as Trustworthy Computing, which, not coincidentally, celebrated its ten year anniversary earlier this January.

In January, 2002, Bill Gates sent an email to all full-time Microsoft employees with grand ambitions for computing, envisioning a future with a pervasive internet, continued growth in personal computers, and a wider range of connected devices, which turned out to be accurate. In a world where so many people are connected to the Internet in so many ways that affect their life, Gates saw that information technology must be “as available, reliable and secure as standard services such as electricity, water services and telephony.” To achieve these immense goals he announced Trustworthy Computing, a drive to improve security, privacy and reliability for all of Microsoft’s offerings.

Over the years, Trustworthy Computing’s most notable contribution was the Security Development Lifecycle, a series of 16 practices to ensure that security is incorporated into every part of the software development process rather than added as an afterthought. Every engineer at Microsoft gets some security training each time they begin a new project, and everyone in the enterprise is expected to know something about security. Tools, software, and personnel are continuously tested or audited for security, privacy, and reliability and, in case anything slips by, compensating controls are built-in to correct flaws elsewhere. Microsoft also  brought in Windows Error Reporting, which drastically reduced crashes, and was among the first to publish privacy standards for developers or offer users layered privacy notices.

More Read

machine learning can be trained to stop cyberattacks
ML is a Vital Defense Against Thwart Digital Attack Surfaces
Nine Components of a HIPAA Risk Analysis
Facebook’s ThreatExchange to Help Cyber Security Experts Coordinate Their Efforts Against Hackers
New Meeting-based Cyberattacks Have Security Specialists on Edge
Data Security Tips: How Jay-Z & Kanye West Used Biometrics to Beat Album Leaks

While Microsoft has come a long way, there is plenty of work left before we can fully trust our computers. Part of the problem, however, comes from the user. One big hurdle in Trustworthy Computing has been users not updating their old software as new and improved solutions become available. For example, Microsoft’s Internet Explorer 9 is much more secure than Internet Explorer 6, but ten years after its launch, IE6 has only just fallen under 1% of the American market despite Microsoft’s best efforts. Another obstacle is that, as Microsoft’s operating system has become hardened, attackers are finding new ways to breach a computer, and now 75% of all attacks are aimed at applications. While compensating controls mitigate some of the risk, the ever-growing IT ecosystem means that Microsoft can’t make computing trustworthy on its own. Still, over the last decade, Microsoft has come a long way and has plenty to celebrate.

Just as Bill Gates said ten years ago about Microsoft, users are connecting a wide array of Apple products, from computers to phones, tablets, and accessories, to the internet and expect privacy, reliability, and security. If versions of Flashback as well as novel malware for Apple operating systems continue to proliferate, Apple will need to implement its own version of the Trustworthy Computing drive. For the sake of anyone with a Macintosh or an iPhone, let’s hope it doesn’t take them ten years to get it right.

 
TAGGED:malware
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

sales and data analytics
How Data Analytics Improves Lead Management and Sales Results
Analytics Big Data Exclusive
ai in marketing
How AI and Smart Platforms Improve Email Marketing
Artificial Intelligence Exclusive Marketing
AI Document Verification for Legal Firms: Importance & Top Tools
AI Document Verification for Legal Firms: Importance & Top Tools
Artificial Intelligence Exclusive
AI supply chain
AI Tools Are Strengthening Global Supply Chains
Artificial Intelligence Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Facebook ‘Hilarious Video’ Phishing Attack is Spreading Quickly

3 Min Read
Image
Uncategorized

CIS Cyber Alert Releases Recommendations to Combat CryptoLocker Malware

3 Min Read
Smart Tips for Better Maritime Security
News

Smart Tips for Better Maritime Security

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?