
Malicious Code Can Look Like It Has Been Signed by Apple
Security researchers just discovered a code-signing bypass vulnerability that allows malicious code to masquerade as an official Apply system file. In other words, some of the implementations of Apple’s official code-signing API can be exploited by hackers. Apple has made…