You were saying in regards to any possible virus problems in a Macintosh computer — “Maybe, but maybe not.”
—
That statement is in the same league as someone saying that they’re going to win the lottery. You can also say to that person, “Maybe, but maybe not.” LOL....
Sure, they may be *just the one* out of several million “trying” that “hits the jackpot” — but for “everyone else” it’s the *but maybe not* part that they will share with the millions of other who try to win the lottery. The won’t get the prize.
And it’s the same with viruses on the Macintosh.... a Macintosh user “getting a virus” on a Macintosh is like trying to win the lottery.... :-) They won’t get the virus. That’s the way it is in “real life” with a Macintosh user.
— — — — — — — — — — — — — — — — — — — — — — — — — — — — — —
And then you said — “While Macs are less vulnerable to random, indirect attacks, they are actually much more vulnerable to DIRECT attacks. [ ... ] I have a family member with a Mac that had a keystroke logger loaded up on her system and her accounts started to be broken into.
—
Yeah..., if you’ve got someone sneaking around your computer when you’re not there and attaching hardware devices to it, or installing hidden software — sure you’re going to have a compromised computer.
And that’s something that is just as true for *all platforms* — with no platform any better or any worse than the next. There’s nothing in an operating system that is going to be effective with someone getting *direct access* to your computer, when you’re gone or are away for a while — during which time this person has that *direct access* to your computer and can do whatever they want to do with it — with either the hardware or software.
Heck!, you can plug something in between the keyboard and the computer and capture those keystrokes, then come back later, unplug it and have all the data you want... LOL...
But, we weren’t talking about people sneaking in to your house and getting on your computer and attaching devices or installing software directly on your computer, in a direct attack, when you are not around... :-)
—
[... and I hear the government also has agents who sneak into your house, install stuff on your computer and then leave, without you knowing it and can track what you do on the computer, too... but — again — we’re not talking about that, are we... LOL...]