Originally posted by SiliconAddict
Right now it's pretty much pointless. OS X has something like 1 virus if even that.
I really believe that one day OS X is going to get a major slapdown via an e-mail virus. Contrary to popular belief no OS is virus proof. All you need is some idiot in front of the keyboard to think he's got an impervious computer to click on a program file and run it and *shrugs*. A virus is nothing more then a computer program. An OS's primary purpose is to follow orders. OS X is no diff. A properly scripted virus could trash a computer. Or if the author is smart enough they can wrap a SMTP engine in the virus and send out infected e-mail from the system.
What I'm interested in is this: Can outside programs access or read a file on OS X's mail prog to harvest e-mail addresses?
Anyone?
You have to realize something--Windows is fertile ground for viruses. MacOS X 10.x is not. On Windows, a substantial number of the viruses rely on a single Microsoft technology, Visual Basic for Applications. Whereas virus writers in the old days were skilled assembly language programmers, today's virus writers can wreck havoc by cutting and pasting VBA code. VBA code enjoys virtually unfettered access to the Windows operating system. It doesn't have the kind of limitations imposed on AppleScript, Java, and other scripting languages. With VBA, Microsoft has virtually eliminated the barriers to entry into the virus-writing market.
Despite all evidence to the contrary, many hold on to the notion that somehow, somewhere, sometime, a smart virus writer will decide to hack the Mac Address Book and wreck havor on us blissfully ignorant Mac users with the Mother of All Mac Viruses. Remember, now that Windows doesn't impose an IQ test on its virus writers. But, for argument's sake let's assume that this smart young person goes astray and decides to do the evil deed. Have you ever opened the MacOS X
AddressBook.data file? Email addresses are encrypted. To the legitimate account holder, these fields are decrypted automatically. However, this smart virus writer is going to have to develop an application that does this in order for his virus to read the addresses of his next set of victims. He is then going to have to get his victims to install this nasty little critter on their machines.
By the time his is finished developing the infrastructure for his virus to propagate, he will end up with something that barely qualifies as spam, let alone a virus.