Skip to main content

Why recent hacks show Apple’s security strength, not its weakness

Follow the news of any security breach on Apple’s systems and the pattern is predictable. Alongside reporting of the problem comes a common warning that Apple users “are not as secure as they think.”

It might be tempting to follow that line of thinking in light of two recent stories of vulnerabilities affecting the Mac and the Apple Watch. In the first instance, the Zoom video-calling app could be abused to let someone spy on you through your webcam. In the second, a flaw in Apple’s Walkie Talkie app could let a hacker eavesdrop on your iPhone conversations. They’re both troubling security issues.

But both cases actually serve as great examples of Apple’s security strength, not its weakness. Apple responded quickly and effectively to stamp out the threat before it could spread — and in this case, Apple isn’t getting as much credit as it deserves.

Actions speak louder than words

MacOS Catalina Hands-on | Macbook Pro
Dan Baker/Digital Trends

No company, system, or platform is totally immune to hacking. Companies love to boast about securing their users, but something is bound to give at some point. One way we can judge a company in terms of its security credentials, though, is the way it reacts to a crisis. And Zoom and Apple could not have provided a better example.

The issue revolved around the way Zoom’s click-to-join video conference system works. Installing Zoom also installed a localhost web server on your machine, which stayed on your Mac even when you uninstalled Zoom. This could be abused to stealthily reinstall Zoom, then access your webcam to pry on you without your knowledge.

When security researcher Jonathan Leitschuh published his findings on the issue on July 8, he revealed that he’d first alerted Zoom to the security breach on March 8 and received no reply. He tried again on March 26, pointing out a “quick fix” and saying he’d alert the public to the breach in 90 days.

Amazingly, Zoom waited until the last of those 90 days to do anything substantial, and even then it only implemented the quick fix and nothing more — which itself was promptly found to be vulnerable a few days later on July 7.

The vulnerability was made public on July 8, and the next day Zoom removed the web server from its app “via a prompted update.” From being made aware of the problem to finally removing the offending piece of software, Zoom took 105 days — almost three and a half months.

Now let’s look at Apple’s response. As we mentioned above, the vulnerability was made public on July 8. The next day, Apple instructed its built-in malware removal tool — installed on every Mac by default — to nuke the Zoom web server on sight. This was done via a silent update, meaning everything was done automatically with no holdups caused by user input (unlike Zoom’s own fix).

That’s right: It took Zoom 105 days to act. And Apple? Just a single day. Apple took no chances, implementing a quick fix that solved the problem once and for all. Zoom dithered.

The reason is simple: The two companies have very different philosophies. The one-click convenience of Zoom is one of its key selling points. To Zoom’s leadership, that was too valuable to lose — surely there had to be a way of addressing the security problem without risking this functionality? Fearing negative publicity and unsure of how to preserve its app’s advantage, the company became paralyzed — and in doing so put millions of Zoom users at risk by not securing their machines.

Apple, on the other hand, understands that the security of its systems is paramount not only to its users but to the success of the company itself. Apple has built a reputation for taking security extremely seriously — look at how it refused to build a backdoor into iOS at the FBI’s request, lest every one of its users be made vulnerable. It knows that prompt action in the face of danger — even if it means some functionality must be sacrificed — is a necessary cost.

Comparing the available resources of Apple and Zoom might not be totally fair, but Apple’s response is certainly the mark of a company that’s serious about security — not one that engages in mere virtue signaling.

No false sense of security

Macbook Air (2018) Review
Riley Young/Digital Trends / Digital Trends

The Zoom incident wasn’t a one-off. From the foundations of MacOS to the way Apple responds to crises like these, the whole company is geared towards security.

MacOS has several features built-in that help to protect the system. There’s Gatekeeper, which will block software that Apple has not approved from running on your Mac unless you expressly allow it to. Any app that runs on the system is sandboxed, meaning it is kept completely separate from critical system components and cannot damage them. Various plugins like Flash, Silverlight, Java, and QuickTime won’t run if they’re not updated to the latest version — and Flash has been disabled by default since 2015’s MacOS Sierra.

Then there’s the T2 Security Chip, which not only safely stores your fingerprint data used in Touch ID, but also manages encrypted storage and enables Secure Boot. The last of these prevents unauthorized or modified operating systems from loading at startup and is set to the most secure settings by default.

Apple also has a system in place that allows people to report security flaws in its products. It was through this system that the Walkie Talkie vulnerability was disclosed and quickly addressed.

Windows has some nifty built-in security features, such as Controlled Folder Access that prevents unauthorized changes to your desktop, documents, and other folders, but is only just starting to catch up to MacOS. In contrast, MacOS has had a number of security features built-in for years thanks to its Unix-based architecture.

That combination of quick action and ingrained security systems highlights Apple’s security strengths. These days no operating system is truly “malware-proof,” but the actions of the company that distributes it — be that Apple, Microsoft, or anyone else — go a long way to keeping it secure and bringing peace of mind to us all.

Editors' Recommendations

Alex Blake
In ancient times, people like Alex would have been shunned for their nerdy ways and strange opinions on cheese. Today, he…
The MacBook Pro is a good enough gaming laptop for me
Halo running on a MacBook Pro.

I'm not a hardcore gamer. But like a lot of people, I like to dabble here and there. Looking at my limited Steam account, I find a handful of remotely current titles I've enjoyed lately, including Baldur's Gate 3 and Civilization VI.

When I fully converted to a MacBook Pro from Windows, I didn't expect to have even my limited gaming needs met. I figured it would just be something I'd lose in the transition. To my surprise, I've found myself quite enjoying the experience of gaming on my M3 Max MacBook Pro 16-inch. It won't be enough to satisfy gamers, but it was enough to get me excited for the future of gaming on the Mac.
Where the Metal meets the microchip

Read more
Here’s why I finally gave up on using Safari on my Mac
A MacBook owner using Google Sheets.

I have a web browser confession to make: I’m an inveterate tab hoarder. I’ve tried to change. I've tried to cull open tabs and tried to resist opening new ones -- but somehow the open tab counter just keeps on rising. At this point, I think I’m beyond saving.

What I’ve learned is that I need a web browser that can accommodate me, that has learned to accept my tab-based failings without judgement or chastisement. And after many years of trying, it turns out that Safari is not that browser.
The tab problem

Read more
As a recent Mac convert, here’s what has surprised me most
Apple MacBook Pro 16 front view showing display and keyboard.

When I transitioned to all-Apple computing, I knew there would be challenges. I assumed there would be many days and weeks of awkwardness before I truly felt at home on my Mac (and iPad, iPhone, and Apple Watch).

That's why it surprised me when I discovered how smooth much of the transition actually was. Here's everything I learned along the way, along with some tips on how I made it as seamless as possible.
Retraining my muscle memory
Both Windows and macOS have various features and functionality that aren't exactly hidden, but aren't entirely intuitive, either. Things like keyboard shortcuts, settings, windows management, and more build up over time. They get burned into our muscle memory, both physically and mentally. Switching to a new platform requires unlearning the old and learning the new.

Read more