How is it they cite Macintosh among the target computers? Have you heard of this?
A few years ago I wrote several Internet components for Borland's compliers. Delphi is their Windows complier and Kylix is their Linux compiler.
The current Mac operating system is a version of Berkley Linux. It uses the standard Linux code to access the Internet.
It was easy to learn how Linux accesses the 'net. I just down loaded the open source Berkley Code and read it.
But windows is not open source.. I was faced with the problem of how to reverse engineer Windows Internet access code. By regular means that would take a lot of time and effort. What I decided to do first was try the Linux code compiled for Windows to see what happened. I did it on a whim. I did not really think it would work.
To my surprise it turned out the only difference between the Linux code and the Windows code was the Linux module contained the data structure used while the Windows code required the address of the data structure be passed to the Internet access code. The functions were the same code, took the same arguments, and were in the same order in the complied code. It turned out Microsoft had purchased the right to use the Berkley Linux code in Windows.
Both Delphi and Kylix use the same code for internet access components. The only difference is in Kylix the code passes the data to the functions and Delphi only passes the address of the data.
Thus the bugs that allow unauthorized Internet access to Windows machines will also allow unauthorizede access to the Mac and Linux machines.
But Macs and Linux have only a small percentage of the market. Macs have less than 3 percent. So hackers have had little reason to attack Macs or Linux machines.
Recently, as windows has become more robust and Microsoft has fixed more and more bugs, there have been successful attacks on both Mac and Linux machines.
Macs and Linux machines are not superior. There are so few Mac and Linux machines that few hackers have bothered to attack them.
That is likely to change in the future.
It's "Them, Too!" FUD. There are no credible reports for anything that can invade an OS X Mac and turn it into a Zombie Bot. However, that does not mean that someone cannot be deliberately using a Mac as a SPAM sending platform.
UPI, AP, and the MSM is part of the sheep control system, and if the sheep happened to look up, they might rebel and stop paying their taxes and watching the MSM for instructions on what to do...