{"id":11351,"date":"2013-03-06T12:54:23","date_gmt":"2013-03-06T20:54:23","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=11351"},"modified":"2013-04-03T12:20:03","modified_gmt":"2013-04-03T19:20:03","slug":"when-your-digital-life-is-on-the-line-signatures-are-not-enough","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/","title":{"rendered":"When Your Digital Life is On the Line, Signatures Are Not Enough"},"content":{"rendered":"<p>It seems like everyone and their dog is adding a security feature to their applications lately to require downloaded files be signed by a trusted certificate before it will be run. <a href=\"http:\/\/support.apple.com\/kb\/ht5290\">Gatekeeper does it<\/a>\u00a0and <a href=\"http:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/jweb\/client-security.html#signed\">Java does it<\/a>, to name but a couple high-profile, relatively recent (and Mac-relevant) examples. This isn&#8217;t a new technique by any stretch of the imagination. Almost as long as the idea of signed files has existed, there have been security settings that would allow you to reject unsigned files. And almost as long as there have been security settings rejecting unsigned files, there have been malicious files forging or using stolen certificates.<\/p>\n<p>Recently there have been a few examples of this occurring, particularly related to Java, as it&#8217;s currently the most high-profile example of a product adding this requirement. A lot of people got super excited about Oracle increasing the default security level to reject unsigned files, and certainly this was not a bad move. However, it does very little to actually increase the security of the Java plugin. In the last couple days, there have been reports of <a href=\"http:\/\/www.zdnet.com\/java-zero-day-malware-was-signed-with-certificates-stolen-from-security-vendor-7000012079\/\">stolen signatures from Bit9<\/a> and <a href=\"http:\/\/news.softpedia.com\/news\/Java-Exploit-Signed-With-Digital-Certificate-Stolen-From-Texas-Based-Firm-334784.shtml\">Clearesult Consulting<\/a> being used in conjunction with Java-based attacks to give the appearance of trusted files.<\/p>\n<p>This requirement really isn&#8217;t posing much of a problem for malware authors, but it&#8217;s making things very difficult for the average user to know what to trust. It&#8217;s getting increasingly difficult to give simple instructions to enable people to know what is or isn&#8217;t valid, as the lines between clearly legitimate and clearly malicious behavior get more and more blurry. Malware authors exploit this by trying to look more and more like the behavior of the &#8220;good guys&#8221; &#8211; be it fake AV products (<a href=\"https:\/\/www.intego.com\/mac-security-blog\/macdefender-changes-name-again-now-macshield\/\">like MacDefender<\/a>) or very convincing phishing emails, or by stealing legitimate certificates. (Try saying that 10 times fast!) This is part of why it&#8217;s important to use security tools such as firewalls and AV scanners that don&#8217;t rely on blanket trust levels to decide when to allow code to run.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems like everyone and their dog is adding a security feature to their applications lately to require downloaded files be signed by a trusted certificate before it will be run. Gatekeeper does it\u00a0and Java does it, to name but a couple high-profile, relatively recent (and Mac-relevant) examples. This isn&#8217;t a new technique by any [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8763,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[307,305,174],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It seems like everyone and their dog is adding a security feature to their applications lately to require downloaded files be signed by a trusted\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Your Digital Life is On the Line, Signatures Are Not Enough - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It seems like everyone and their dog is adding a security feature to their applications lately to require downloaded files be signed by a trusted\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-06T20:54:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-04-03T19:20:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/\",\"name\":\"When Your Digital Life is On the Line, Signatures Are Not Enough - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#primaryimage\"},\"datePublished\":\"2013-03-06T20:54:23+00:00\",\"dateModified\":\"2013-04-03T19:20:03+00:00\",\"description\":\"It seems like everyone and their dog is adding a security feature to their applications lately to require downloaded files be signed by a trusted\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When Your Digital Life is On the Line, Signatures Are Not Enough\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"When Your Digital Life is On the Line, Signatures Are Not Enough\",\"datePublished\":\"2013-03-06T20:54:23+00:00\",\"dateModified\":\"2013-04-03T19:20:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#webpage\"},\"wordCount\":350,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"digital life\",\"Layered Security\",\"Mac\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It seems like everyone and their dog is adding a security feature to their applications lately to require downloaded files be signed by a trusted","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/","og_locale":"en_US","og_type":"article","og_title":"When Your Digital Life is On the Line, Signatures Are Not Enough - The Mac Security Blog","og_description":"It seems like everyone and their dog is adding a security feature to their applications lately to require downloaded files be signed by a trusted","og_url":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-06T20:54:23+00:00","article_modified_time":"2013-04-03T19:20:03+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/","name":"When Your Digital Life is On the Line, Signatures Are Not Enough - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#primaryimage"},"datePublished":"2013-03-06T20:54:23+00:00","dateModified":"2013-04-03T19:20:03+00:00","description":"It seems like everyone and their dog is adding a security feature to their applications lately to require downloaded files be signed by a trusted","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"When Your Digital Life is On the Line, Signatures Are Not Enough"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"When Your Digital Life is On the Line, Signatures Are Not Enough","datePublished":"2013-03-06T20:54:23+00:00","dateModified":"2013-04-03T19:20:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#webpage"},"wordCount":350,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["digital life","Layered Security","Mac"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/when-your-digital-life-is-on-the-line-signatures-are-not-enough\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2X5","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11351"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=11351"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11351\/revisions"}],"predecessor-version":[{"id":11361,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11351\/revisions\/11361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=11351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=11351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=11351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}