Malicious Code Can Look Like It Has Been Signed by Apple
Security researchers just discovered a code-signing bypass vulnerability that allows malicious code to masquerade as an official Apply system file. In other words, some of the implementations of Apple’s official code-signing API can be exploited … Continue reading Malicious Code Can Look Like It Has Been Signed by Apple