You won't run into problems with viruses. I wouldn't worry about it.
For now. But as our platform is getting more popular, it is not only getting more attention from the potential users....
You won't run into problems with viruses. I wouldn't worry about it.
Well, I will not spend a penny and go through the hassle of keeping my antivirus up-to-date and slowing down my machine because I want to protect the PC users that don't update their antivirus...
I'll put it this way i have used PC/Mac for quite a few years and the amount of Security patches for the mac don't even come to a quarter of the thousands of updates I've had to do on a windows pc and I have been using a PC since Windows 95.
Edit: I'm sure the PC Fanboys on engadget are having a field day with this.
Maybe because at the time of OS 9 people were signing Apple's death certificate. Apple was nothing in those post Steve pre iCEO days. Thats why it had less market share. As for virii the reason why was because OS 9 had more holes than OSX will ever have.
No one is saying OSX isn't a great operating system. Its amazing! Its just not PERFECT, its not IMMUNE, and Apple hasn't been the best at patching known bugs... IE the Java exploit that got ignored for quite some time.
This post has been painful to read, and I've been sitting here debating whether or not it's worth replying, as I'd basically be contributing to what I'm complaining about, and I'm incapable of being succinct.
But it's Friday, and who doesn't like a good internet argument on a Friday
First off, to those claiming that Charlie is an attention-whore, or trying to get a job at Apple:
Charlie is a huge fan of OS X. He's had to state this in pretty much every interview, because people seem to think that by pointing out security vulnerabilities with the Mac, that means he doesn't like it. He uses OS X, he likes OS X. He wrote a book about hacking OS X (with another security researcher) that's a really good read. It's not about poking fun at OS X, it's about wanting the system that you yourself use to be more secure.
Charlie makes his living (like many of us) as a security professional. We get paid to either break into companies or try and break products. As far as security professional's go, he's a very well-regarded one. He's not a fourteen year old kid in a basement writing irc-bots.
There is near-unanimous agreement in the security community (as unanimous as we ever get) that Apple's security posture is near the bottom of all vendors. That includes companies like Microsoft, and Cisco, and Adobe. This is based on years of working with them to get them to patch vulnerabilities. They are categorically the last to release patches when a vulnerability has been discovered, and their whole "veil of secrecy" that people here discuss ad naseum carries over into even this area. Things are promising, however, as they just hired someone to work in this capacity (someone most of us have a lot of respect for and consider to be a great hire). Time will tell if they get better about handling vulnerabilities.
The thing is, Microsoft (who historically was the punchline to any joke about vulnerability management), has been doing things right for about the past five years. This doesn't excuse the way they acted before that, and it doesn't mean that now Windows is magically vulnerability-free (although both Vista and 7 have been a marked improvement from XP), but they've gotten significantly better about handling vulnerabilities (and are now leaps and bounds better than Apple is).
The thing is though, Microsoft had to do this, as they represent a huge portion of installed systems, and are the biggest target. They were getting beaten up about their security (rightfully so) and it was to the point that it actually effected business.
The same is not true about Apple. The reality, is that they can be as bad as they are about security management because they don't yet have a reason not to be. We in the security community are all about security for the sake of security (it's a philosophical tenant), but that's not pragmatic. Companies only care about security if it effects their business (and I don't necessarily think that's a bad thing), and for Apple, it doesn't.
People keep talking about viruses on here, and to be honest, we haven't cared about viruses for almost ten years. Viruses eat up CPU cycles, and generate network traffic and are easy to detect in an environment that has even basic security monitoring.
Everything comes back to money. Viruses don't cost money anymore (not of the magnitude that we worry about). What does cost money is malware that hijacks online banking credentials, or grabs ssn's, or online gaming accounts, or acts as a way for an attacker to obtain sensitive corporate information. This past year the amount of money stolen from banks electronically was about 10 times the amount taken in actual physical robberies.
And attackers don't care how they obtain this information. We don't care about owning a box for the sake of owning it, we don't care about stealing passwords from a user unless that is a means to obtain what we're actually after. Honestly, we're after the money, and we'll spend large amounts of our own time and money if it means we can get more of it.
If that means developing exploits for OS X, then that's what we do. If it means just getting a user to visit a website, then we do that.
Which proves my point. Nobody cares about Macs is a stupid argument. Even if everyone and their grandma cared about hacking Macs it still wouldn't be as easy to break into as other OSes out there. The marketshare myth just annoys the hell out of me. OS 9 proves its smoke and mirrors.
You are correct. Both Viruses and Trojans are very aptly named, if you know a thing or two about history and medicine.
A Virus is a self replicating program that requires no human interaction to spread. To do this it must take advantages of "holes" in a system, because systems are not designed to allow a program to do this for obvious reasons. A security hole may enable the creation of a Virus, however often times you need a number of holes in a number of layers in order to create an effective virus.
In simple terms, it's no use having a hole that allows you to enter a machine, if there is not a second hole that allows you to reproduce, and yet another hole that allows you to transmit yourself undetected to other machines.
Quite differently is a Trojan. Just like the horse, this is just a program designed to look like something else. No system is immune to these, because you are tricking the computer user into thinking they are doing one thing, when really they are doing something else. If I rename your Chrome browser to "Firefox", that is a Trojan, just not a harmful one. If I write a destructive Apple Script and call it "photoshop", that is also a Trojan, and there is no security hole that needs to be taken advantage of.
The analogy goes back to the Human immune system. You can have a kickass immune system that doesn't let any viruses in, nor reproduce, and certainly not transmit. That doesn't mean that if your friend hands you Neosporin for your large cut, and really it's just a big ol' bottle of AIDS you're rubbing on your wound, that you aren't @#$%ed.
As long as the User has the ability to be destructive to a system they own, a Trojan will be a viable way of doing damage.
All of Miller's exploits require the use of a cross-over cable, which is never a network configuration you see in the wild.
His exploits are not relevant to any one connected to a network wirelessly or via an unmodufied Ethernet cable.
Specifically, the target computer is connected to the Internet wirelessly and Miller's computer is directly connected to the target computer via a cross-over cable.
So, don't let a hacker connect to your computer with a cross-over cable. A cross-over allows the hacker to bypass many of the security features emphasized in OSX that are limited in Windows.
Spot on. It's why the pirated iWork and porn codec trojans were effective. You install it, you give it your password, because you went looking for it. You're borked. It's no different on any OS, and it's very difficult for an OS writer to protect against human stupidity.
You don't understand though, its not that its not easy to break in, its just there is no need for it. Why break into 1000 macs when I can have 100000000 PC's. The object of these organized crime rings is numbers, not glory.
I'd lvoe to see an Apple apologist answer this.
Fact is, nobody gives a $%^& about a mac.
This post has been painful to read, and I've been sitting here debating whether or not it's worth replying, as I'd basically be contributing to what I'm complaining about, and I'm incapable of being succinct.
But it's Friday, and who doesn't like a good internet argument on a Friday
First off, to those claiming that Charlie is an attention-whore, or trying to get a job at Apple:
Charlie is a huge fan of OS X. He's had to state this in pretty much every interview, because people seem to think that by pointing out security vulnerabilities with the Mac, that means he doesn't like it. He uses OS X, he likes OS X. He wrote a book about hacking OS X (with another security researcher) that's a really good read. It's not about poking fun at OS X, it's about wanting the system that you yourself use to be more secure.
Charlie makes his living (like many of us) as a security professional. We get paid to either break into companies or try and break products. As far as security professional's go, he's a very well-regarded one. He's not a fourteen year old kid in a basement writing irc-bots.
There is near-unanimous agreement in the security community (as unanimous as we ever get) that Apple's security posture is near the bottom of all vendors. That includes companies like Microsoft, and Cisco, and Adobe. This is based on years of working with them to get them to patch vulnerabilities. They are categorically the last to release patches when a vulnerability has been discovered, and their whole "veil of secrecy" that people here discuss ad naseum carries over into even this area. Things are promising, however, as they just hired someone to work in this capacity (someone most of us have a lot of respect for and consider to be a great hire). Time will tell if they get better about handling vulnerabilities.
The thing is, Microsoft (who historically was the punchline to any joke about vulnerability management), has been doing things right for about the past five years. This doesn't excuse the way they acted before that, and it doesn't mean that now Windows is magically vulnerability-free (although both Vista and 7 have been a marked improvement from XP), but they've gotten significantly better about handling vulnerabilities (and are now leaps and bounds better than Apple is).
The thing is though, Microsoft had to do this, as they represent a huge portion of installed systems, and are the biggest target. They were getting beaten up about their security (rightfully so) and it was to the point that it actually effected business.
The same is not true about Apple. The reality, is that they can be as bad as they are about security management because they don't yet have a reason not to be. We in the security community are all about security for the sake of security (it's a philosophical tenant), but that's not pragmatic. Companies only care about security if it effects their business (and I don't necessarily think that's a bad thing), and for Apple, it doesn't.
People keep talking about viruses on here, and to be honest, we haven't cared about viruses for almost ten years. Viruses eat up CPU cycles, and generate network traffic and are easy to detect in an environment that has even basic security monitoring.
Everything comes back to money. Viruses don't cost money anymore (not of the magnitude that we worry about). What does cost money is malware that hijacks online banking credentials, or grabs ssn's, or online gaming accounts, or acts as a way for an attacker to obtain sensitive corporate information. This past year the amount of money stolen from banks electronically was about 10 times the amount taken in actual physical robberies.
And attackers don't care how they obtain this information. We don't care about owning a box for the sake of owning it, we don't care about stealing passwords from a user unless that is a means to obtain what we're actually after. Honestly, we're after the money, and we'll spend large amounts of our own time and money if it means we can get more of it.
If that means developing exploits for OS X, then that's what we do. If it means just getting a user to visit a website, then we do that.
Some people are being rather silly.
Any computer CAN get a virus.
It's harder to get a virus on Mac/Linux because:
c) All the people coding stuff that's got an .exe extension won't affect Macs, 'cos Macs won't run anything with an .exe extension. Even if it is a virus it won't affect the computer.
And don't know. Why don't you ask Miller? I'm sure he would be happy to tell you =o
It still doesn't debunk the whole "it's more secure" thing. Market share is only part of it. Like I said. Its not just "People don't give a darn about Macs"
I don't know why people don't get it. OS 9 = perfect example of this. For the last time.
It updates itself. As far as performance, you won't even know it's there. These are not like the antivirus programs from years ago and today's machines are much faster.
Great post. It's unfortunate that people still think Winnuke is the tool dejour. Frankly, no one gives a crap about attacking your PC unless they can control it and a million others like it.
Where does your logic base come from? I'm asking because your comparison is apples and oranges. If being "famous" means running from the feds and not being able to take advantage of the fame aside from black market underworld deals then I don't think you have a lot of people standing up.
All of Miller's exploits require the use of a cross-over cable, which is never a network configuration you see in the wild.
His exploits are not relevant to any one connected to a network wirelessly or via an unmodufied Ethernet cable.
Specifically, the target computer is connected to the Internet wirelessly and Miller's computer is directly connected to the target computer via a cross-over cable.
So, don't let a hacker connect to your computer with a cross-over cable. A cross-over allows the hacker to bypass many of the security features emphasized in OSX that are limited in Windows.
This post has been painful to read, and I've been sitting here debating whether or not it's worth replying, as I'd basically be contributing to what I'm complaining about, and I'm incapable of being succinct.
But it's Friday, and who doesn't like a good internet argument on a Friday
First off, to those claiming that Charlie is an attention-whore, or trying to get a job at Apple:
Charlie is a huge fan of OS X. He's had to state this in pretty much every interview, because people seem to think that by pointing out security vulnerabilities with the Mac, that means he doesn't like it. He uses OS X, he likes OS X. He wrote a book about hacking OS X (with another security researcher) that's a really good read. It's not about poking fun at OS X, it's about wanting the system that you yourself use to be more secure.
Charlie makes his living (like many of us) as a security professional. We get paid to either break into companies or try and break products. As far as security professional's go, he's a very well-regarded one. He's not a fourteen year old kid in a basement writing irc-bots.
There is near-unanimous agreement in the security community (as unanimous as we ever get) that Apple's security posture is near the bottom of all vendors. That includes companies like Microsoft, and Cisco, and Adobe. This is based on years of working with them to get them to patch vulnerabilities. They are categorically the last to release patches when a vulnerability has been discovered, and their whole "veil of secrecy" that people here discuss ad naseum carries over into even this area. Things are promising, however, as they just hired someone to work in this capacity (someone most of us have a lot of respect for and consider to be a great hire). Time will tell if they get better about handling vulnerabilities.
The thing is, Microsoft (who historically was the punchline to any joke about vulnerability management), has been doing things right for about the past five years. This doesn't excuse the way they acted before that, and it doesn't mean that now Windows is magically vulnerability-free (although both Vista and 7 have been a marked improvement from XP), but they've gotten significantly better about handling vulnerabilities (and are now leaps and bounds better than Apple is).
The thing is though, Microsoft had to do this, as they represent a huge portion of installed systems, and are the biggest target. They were getting beaten up about their security (rightfully so) and it was to the point that it actually effected business.
The same is not true about Apple. The reality, is that they can be as bad as they are about security management because they don't yet have a reason not to be. We in the security community are all about security for the sake of security (it's a philosophical tenant), but that's not pragmatic. Companies only care about security if it effects their business (and I don't necessarily think that's a bad thing), and for Apple, it doesn't.
People keep talking about viruses on here, and to be honest, we haven't cared about viruses for almost ten years. Viruses eat up CPU cycles, and generate network traffic and are easy to detect in an environment that has even basic security monitoring.
Everything comes back to money. Viruses don't cost money anymore (not of the magnitude that we worry about). What does cost money is malware that hijacks online banking credentials, or grabs ssn's, or online gaming accounts, or acts as a way for an attacker to obtain sensitive corporate information. This past year the amount of money stolen from banks electronically was about 10 times the amount taken in actual physical robberies.
And attackers don't care how they obtain this information. We don't care about owning a box for the sake of owning it, we don't care about stealing passwords from a user unless that is a means to obtain what we're actually after. Honestly, we're after the money, and we'll spend large amounts of our own time and money if it means we can get more of it.
If that means developing exploits for OS X, then that's what we do. If it means just getting a user to visit a website, then we do that.
"a farmhouse in the country with no locks, and Windows is living in a house with bars on the windows in the bad part of town."
HAHAHA .Yeahhh, RIGHT!!! That analogy can only come from a biased person set out to prove a lame point!
Your not debunking anything you are just stating blubbering rubbish. Give some examples instead of just quoting other peoples comments and throwing in random opinions.
Security through Obscurity.....![]()
I never claimed to debunk a darn thing. Prove to ME how OS X is less secure than Microsoft Windows. WITHOUT using "it has less marketshare"
Blubbering rubbish? How so? It's a fact. Get yours straight nummy num and come back then we'll talk. OK?
Random opinions? OK. Whatever you say. =/