It was revealed on Monday that Apple's upcoming OS X Mountain Lion will feature an automatic security check feature that will ensure users have the most up-to-date software protection amid a growing number of Mac-targeted malware.
An update to the Mountain Lion Developer Preview shows a new automated system that runs a daily check with Apple's servers to make sure OS X 10.8 users have the most current security patches and protections against known malware and viruses.
Some users of Symantec's PGP Desktop encryption software are finding that after installing OS X 10.7.4, the program does not appear to respond properly and encrypted disks can no longer be accessed. When attempting to mount the drives, nothing happens, and the program states in its logs that the disks are already mounted.
Apple's latest update to OS X contains a dangerous programming error that reveals the passwords for material stored in the first version of FileVault, the company's encryption technology, a software consultant said.
David I. Emery wrote on Cryptome that a debugging switch inadvertently left on in the current release of Lion, version 10.7.3, records in clear text the password needed to open the folder encrypted by the older version of FileVault.
1Password is a popular password service which offers apps and browser plug-ins for a number of platforms, including Mac, Windows, iOS and Android. The service automatically generates strong, unique passwords whenever a login is needed, keeping them in a keychain under a master password. Once authorized, 1Password can then automatically fill in user names and passwords when needed without the user having to know the often complex passwords created for maximum security.
Macs have been relatively safe from the kind of viruses that plagued Windows users through the last couple decades. But once it was revealed that a variation of Flashback was able to create a botnet of more than half a million Macs thanks to an unpatched Java vulnerability users stood up and took notice. OS X has largely been free of viruses and worms up to this point, but that still doesn't stop unsuspecting users from being tricked into typing an admin password into a cleverly (or, sometimes, not-so-cleverly) disguised installer.