It was discovered on Thursday that famed hacker and former Microsoft employee Kristin Paget is now working for Apple as a core operating system security researcher, suggesting the Cupertino company is beefing up OS X safeguards amid recent Mac-directed malware attacks.
When employed by Microsoft, Paget worked alongside a small team of hackers tasked to find security holes in Windows Vista before the OS was released to the public in 2007, reports Wired. The group apparently found so many flaws that Vista's launch date was pushed back while fixes were put in place.
According to her LinkedIn profile, as of September Paget is listed as being a "Core OS Security Researcher at Apple" based out of Cupertino. Previously, she held the position of chief hacker at security firm Recursion Ventures, but said in June that she wanted to find a job building "security-focused hardware."
Paget, formerly known as Chris Paget, gained notoriety for a number of hacker feats of strength, including a cellphone call-intercepting station at the Defcon hacker conference and a long-range RFID identifier duplication device.
While the hacker's responsibilites at Apple remain unknown, it can be speculated that she will be working to thwart future attacks like the Flashback trojan that affected an estimated 600,000 Macs in April. Most recently, a piece of Mac-targeted malware similar to Flashback was found embedded in a webpage dedicated to the Dalai Lama.
37 Comments
I'm sure she/he/it (?) will make a good addition to apple. Edit: OK I'm a jerk. But that picture was a little jarring. Sorry :)
I was thinking she looked awfully manly, then read about the name change. Makes perfect sense. Also good to see Apple making moved to improve security.
She needs to go work at Oracle if she is going to fix Java bugs.
Great! I am really glad Apple is not blind and still thinking they can't be touched. I just hope that some day soon, the virus protection will be built in to the I/O controller so that all data in and out of the box is checked independently of the OS. This is a nice job for an Ax chip that checks every packet and every byte coming into the memory. This way, you can't hack it as easily as you can when it is dependent on the OS. Yes, it will cost more, but for the protection of the Apple image, it will be worth it.
Great! I am really glad Apple is not blind and still thinking they can't be touched.
Touched by what, exactly?
We're up to how many trojans now? 6?
We get one (at most, two) every year.
That's negligible. And not especially interesting either way, in light of the proliferation of iOS.