The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security researcher has discovered. “Security, incident response, and forensics processes and personnel use code signing to weed out trusted code from untrusted code.
Read full news article on Help Net Security