Posted on 07/22/2010 7:40:23 AM PDT by for-q-clinton
It depends. Yes I agree windows has a much larger install base and has a lot more 3rd party products that can expose the user to issues. But one of the "selling" points of Macs is it's perceived as more secure than windows. But as proven by things such as the pwn2own contest it's not. So for users looking for a more secure platform they are better off learning secure practices and not relying soley on OS marketing hype.
If you feel that 3rd party apps on windows needs more security attention, have at it and post all day long. I'll focus on the FUD being spred by macbots.
My god, don't you people know when you're being scammed???
Windows has become solid enough with Win7 that the so-called "security vendors" and anti-virus salesmen are desperate for revenue. Some (like Symantec) are diversifying into other services... some are saying, "Well, who else can we scare into buying our products??"
And the Mac is just the next one down the list after Windows.
Show me the Mac viruses.
Not the generic human-engineered malware that can affect any computer with a gullible operator. The Mac viruses, self-replicating, the ones that a human can't defend against with simple common sense.
Don't prevaricate. Show me the Mac viruses.
Otherwise, take these anti-virus products and shove 'em, until such time as there's something to protect against.
Correct. That's why we have to look at even playing fields like pwn2own where OSX was the first one hacked for the past 3 years. And last year OSX gave read and write acess whereas windows only gave up read access. Both are serious but there's no doubt that read/write is much worse than just read.
We'll never settle the issue between how many viruses are due to install base so let's focus on common ground tests.
This is SECUNIA posting this not Symantec or McAfee.
It took a while but someone finally came in and cried bias against SECUNIA.
Which one has more successful malware in the wild? What's the ratio, like a hundred thousand to one for distinct viruses?
We can do the starbucks test and see which system is able to get online without issues
In my experience with both, it is much easier to get a Mac on a wireless network than Windows.
But seriously security by obscurity is not any type of real security. ... Anyone who understands security will laugh at your statement.
We're laughing at you since you misunderstand the concept of security through obscurity. Obscurity in this sense means secrecy, that to keep an attacker from knowing something will stop him (passwords and such don't count). For example, to rely on disabling the SSID broadcast (obscurity of the SSID) or MAC address filtering (obscurity of the allowed MAC addresses) on your wireless network for security would be foolish. Once a hacker figures those out, and any decent one can, you're hosed.
However, notice "rely" in bold. Obscurity not solely relied on is not necessarily bad, even good accepted security practice. It's called defense in depth. It is still suggested to disable SSID broadcast and enable MAC filters on your wireless network. You make the hacker's life harder by enabling them, maybe he'll hit the neighbor's wireless network instead since they are broadcasting SSID and don't filter MAC addresses. In the end though you don't rely on them, but on the security of the WPA2 encryption you've enabled.
It's like a wall safe behind the picture. Security experts will say that you shouldn't hide your money in a cubby hole behind a picture, relying on the obscurity of its location for security. But they aren't going to say it's a bad thing to hide your wall safe behind that same picture, relying on the safe for security, with the added layer of protection of the obscurity of its location.
What you are talking about is security through minority, and its existence is debatable. The counter-argument is that all else being equal, a long-standing, widely-popular system by now should have had most of the vulnerabilities found and thus be currently more secure than a less popular system that has not been through its trial of fire.
You are talking about an artificial situation that has nothing to do with the way people use computers.
Google now has a policy of not letting people use Windows machines because that is how their network was hacked, through Windows machines. All the programmers were already on Mac on Linux. So this affects the non-technical people at Google. That is a real-world situation.
If you are looking for a secure computer, I have one for you. It's an old Dell laptop running Windows 95. It's secure because it's in my storage room, it's not hooked up to a network, and you will have to get the key to the room from me. At last, we have found a secure Windows machine.
Actually you are the one that used obscurity in first. And the only applicable way to apply it was in that OS X is obscure to the hacker movement. Meaning out of the millions of hits they get per day only a few are from OS X...so it’s obscure. True you can change the definition to minority, but you are the one that chose to use obscurity as the word first.
So tell me how the past 3 years where OSX was hacked easiest and quickest can’t be applied to real world scenarios.
I can see it happen very easily in the real world. Typically just requires a user to navigate to a website.
Irrelevant. The issue is whether a small install base of software (an OS is software) will prevent malware writers from taking interest in and exploiting that software. If they'll look at 12,000 ISS products and say "I'm going to take the time and effort to write malware for this," they're definitely going to do the same for 50+ million installs of OS X. And they have. They just haven't been very successful.
BTW: You should read this
http://blogs.technet.com/b/steriley/archive/2007/10/16/myth-vs-reality-wireless-ssids.aspx
Basically laughs at the idea of hiding the SID is any level of security what-so-ever.
There you go again changing the facts and issues. You posted self-replicating viruses. Which means they can just run from one machine and then attach and then spread like wildfire. Then you admit the issue is over malware which Mac does have malware that does exist today and they even block it from the OS level once they find out about it with the built-in anti-malware software.
So quit trying to change the meaning of the words you use to suit your argument du jour. Let's focus on each point.
1) Name one self-replicating virus on windows 7 2) Show me one malware virus requiring user interaction that targets a tiny install base that was widely spread.
Irrelevant. The question is whether they would bother to write any malware at all for it. And, yes, I do consider Windows 7 to be a very good OS.
You can "see", that is to say, image anything you want. Please give one real-world, everyday situation where this is happening.
A real-world situation is Google. They won't be using Windows machines because in the real world, the everyday world, Windows machines have too many exploits.
And keep those goalposts moving!
Don't play naive, Secunia is a business selling security software, and it's expensive, too:
http://secunia.com/vulnerability_scanning/corporate/pricing
Geez, wake up. These companies aren't in it for their health, they're there to make a profit off your fear.
Not that there's anything wrong (or new) about that.
it's not irrelevant at all as it goes to the second part of my statement on why OS X hasn't had many viruses/malware in the wild. It's tiny userbase PLUS it's secure enough to keep most users safe. Meaning you need to get the dumbest of the dumb OS X users tricked into going to your site. Why bother when there are way more windows users. That's WHY you don't see much malware on OSX. So it is very relevant.
Changing the argument to say worms have attacked smaller installs is just asinine. They are completely different. A worm will self-replicate making it easier to target and attack machines that are vulnerable to the attack. Malware getting installed by dumb users is a lot more involved and take a lot more time to hit many users especially when you are targeting only 5% of the computer market.
it's not irrelevant at all as it goes to the second part of my statement on why OS X hasn't had many viruses/malware in the wild. It's tiny userbase PLUS it's secure enough to keep most users safe. Meaning you need to get the dumbest of the dumb OS X users tricked into going to your site. Why bother when there are way more windows users. That's WHY you don't see much malware on OSX. So it is very relevant.
Changing the argument to say worms have attacked smaller installs is just asinine. They are completely different. A worm will self-replicate making it easier to target and attack machines that are vulnerable to the attack. Malware getting installed by dumb users is a lot more involved and take a lot more time to hit many users especially when you are targeting only 5% of the computer market.
I don’t see their Mac product. Everything appears to be targeting windows or am I not undestanding their product?
Please note that vulnerabilities DO NOT EQUAL exploits.
If you want on or off the Mac Ping List, Freepmail me.
But but but those of us who use Macs also have used PCs quite a bit and, well, we really don't see any room to debate as to which is less of a mal magnet.
I will grant that I have no experience with 7, which by the accounts I have seen is decent.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.