The blogosphere is abuzz over the latest Black Hat presentation exposing the security holes of Apple’s Mac OS X. The upshot is that Microsoft Windows, in comparison, does a better job of protecting its users, especially against network protocol attacks. A proof-of-concept hack shown at the Black Hat security conference involved plugging one rogue Mac computer into an enterprise network, where it was soon able to gather the authentication credentials of all the other Macs in the environment.
My opinion on this: It doesn’t matter if this rogue machine is Windows, Linux, or Mac OS X. A rogue machine is the most likely gateway into an enterprise environment for a sophisticated attack. It is a primary security tenant that one should know what is on one’s network. Rogue doesn’t mean unknown hardware either it could be a trojanized system running any OS. Without the right controls and sensors this might be completely missed and as with any sophisticated attack would be hard to detect.