Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

In their words: Experts weigh in on Mac vs. PC security
Cnet ^ | Feb 1, 2010 | Elinor Mills

Posted on 02/06/2010 12:09:39 PM PST by driftdiver

When I am asked the question "Which is more secure, Mac or PC?" I find myself stumbling around for a response because I don't have a clear-cut answer. I use both. And I use antivirus software with both.

So I decided to conduct an informal survey of a bunch of security experts and see what they had to say in the hopes that people can use the information to help them come to their own conclusions.

Before I provide quotes from the 32 experts who participated in the survey, along with edited comments from an interview with a Microsoft representative and a link that Apple provided, I'd like to share some relevant research from antivirus vendor ESET.

More than half of Americans believe that PCs are "very" or "extremely" vulnerable to cybercrime attacks, while only 20 percent say the same about Macs, according to this ESET survey. (Credit: ESET)

ESET released the results of a survey in November related to awareness of cybercrime in the U.S. The survey of more than 1,000 people found that while both PC and Mac users perceive the Mac as being safer, Mac users are victims of cybercrime just as frequently as PC user

(Excerpt) Read more at news.cnet.com ...


TOPICS: Society
KEYWORDS: ilovebillgates; internetsrsbusiness; itard; iwanthim; iwanthimbad; mac; microsoft; microsoftfanboys; security; windows
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160161-165 next last
To: Swordmaker

Could it be because PC’s are 80-90 percent of the computer population?


141 posted on 02/09/2010 5:15:25 AM PST by Biggirl ("Jesus talked to us as individuals"-Jim Vicevich/Thanks JimV!=^..^==^..^==^..^==^..^==^..^=)
[ Post Reply | Private Reply | To 119 | View Replies]

To: driftdiver
They would far rather attack Windows PCs as there are lots more of them. So you are much less likely to be bothered by malware if you use a Mac, or run Linux on your PC.”

Pretty well answers the whole debate.

142 posted on 02/09/2010 5:18:18 AM PST by McGruff (Don't criticize. Explain to me who I should support other than Sarah Palin.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver
Adobe acknowledged that all versions of its popular PDF software, including editions for Windows, the Mac and Linux, contain at least one, and possibly two, critical vulnerabilities.

whoop de do. On the Mac the vulnerability simply meant the adobe reader crashed. A Denial of Service failure. No possibilty of code execution. And that just for those few Mac users that bother Adobe using it instead of letting Preview handle the PDF File.

143 posted on 02/09/2010 5:23:33 AM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 101 | View Replies]

To: driftdiver
Cybercriminals create botnet using Mac computers

Very strange thing about that Mac botnet, Driftdiver. Nobody has EVER found an infected Mac member of it in the wild! Not even Symantec. . . who subsequently FIRED the two characters who published the article claiming it's discovery in the Virus Bulletin! To this day Symantec reports the virulence of the supposed Trojan that spread the Bot, which was included in a BitTorrent copy of the Trial version of iWork'09 that the torrent sites themselves listed as having only been download fewer than two dozen times before the infection was discovered, as "zero to 49"!!! Despite those bozos claim the bot was "20,000 Macs" large in their artcle. Not one. None. Zip. Nada.

144 posted on 02/09/2010 5:36:54 AM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 103 | View Replies]

To: driftdiver
“A skilled hacker could use the knowledge to insert malicious code into the same space as an active process, like Safari, and force a Mac to run malware.”

And that one is like why the recipe for elephant stew is so hard to make. It's the first instruction. First you have to kill the elephant.

For that exploit to work, if you read the hackers paper, which I did, the hacker Awouls have had to have root access to the Mac to insert the code. First you have to kill the elephant. Once you've done that, the stew is easy.

145 posted on 02/09/2010 5:47:19 AM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 103 | View Replies]

To: Swordmaker

same ole tired argument based on fallacy.


146 posted on 02/09/2010 5:53:44 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 144 | View Replies]

To: driftdiver
Apple Mac OS X CoreGraphics PDF Type1 Font Integer Overflow Vulnerability

Remote exploitation of an integer overflow vulnerability in Apple Inc.’s Mac OS X could allow an attacker to execute arbitrary code with the privileges of the currently logged in user.

BZZZZZT !!!! Wrong!

This what comes of having Windows centric security people write these vulnerability warnings. IDefense goes on to say:

This vulnerability exists due to the way PDF files containing Type 1 fonts are handled. When processing a font with an overly large length, integer overflow could occur. This issue leads to heap corruption which can allow for arbitrary code execution.
Except for one little problem with their Windows' centric thinking: the data heaps on Macs are non-executable. Arbitrary code cannot run in the heap on a Mac.
147 posted on 02/09/2010 5:59:28 AM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 103 | View Replies]

To: Dick Vomer
What do you think this thing was that was sent to me?

Probably a Window executabe malware of somekind that won't run in a Mac.

148 posted on 02/09/2010 6:03:49 AM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 118 | View Replies]

To: driftdiver
same ole tired argument based on fallacy.

What's the fallacy. That the to, now ex-Symantec workers made up their story about the Macbot? Or that some one has to "not" find any to prove it doesn't exist? The fact is that Mac anti-virus vendors have put the profile of the so called bot into their indexes and it is NOT being reported as being found in the wild. Apple has NOT seen any being brought in for service with such an infection. The payload the bozos claimed it carried would have shown up in statistcal bank data, it hasn't. So what fallacy are you falsely attributing to my post, driftdiver? Please elucidate.

149 posted on 02/09/2010 6:20:01 AM PST by Swordmaker (Remember, the proper pronunciation of IE isAAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 146 | View Replies]

To: Swordmaker

that macs have no security vulnerabilities.


150 posted on 02/09/2010 6:20:53 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 149 | View Replies]

To: driftdiver
If MSFT finally got an OS to work with 7, God bless them.

As for me, I have yet to get any malware on my Mac running OS X sans AV for about 7 years.

151 posted on 02/09/2010 6:32:49 AM PST by Tribune7 (Obama Is An Obstructionist)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tribune7

And I haven’t had any malware on my windows PC for more than 9 years.


152 posted on 02/09/2010 6:45:21 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 151 | View Replies]

To: driftdiver

But you’re not counting AV as malware :-)


153 posted on 02/09/2010 7:41:44 AM PST by Tribune7 (Obama Is An Obstructionist)
[ Post Reply | Private Reply | To 152 | View Replies]

To: Tribune7

Well you’re right, I did install iTunes once.


154 posted on 02/09/2010 7:44:12 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 153 | View Replies]

To: driftdiver
Is there a vi based browser?

There are several console-based browsers (elinks comes to mind immediately).

If you want a browser in your editor, you'll probably want to be using emacs. :-)

155 posted on 02/09/2010 8:14:18 AM PST by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Cacique

Your point about income differentials is a good one. However, the ‘market share’ canard has been completely debunked. Do a search on the “witty worm”. It’s a worm from a few years ago that was written and exploited even though the target universe was some 15-20k systems total. I suspect there are a few more than 20k Macs out there. If there were an easy way to subvert them, it would be done.


156 posted on 02/09/2010 8:18:12 AM PST by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 23 | View Replies]

To: driftdiver
Do you concede there are more threats than just viruses? Do you also concede that there are numerous exploits out there for Macs. Heck even Apple will admit to that.

 I think a direct answer to her question would be illuminating.

Can you point me to a site that will automatically install a virus on my Mac?

 I realize that all operating systems are vulnerable to stupid users, but I'd really be interested in seeing something like what she requested. It would surely put the argument of the safeness of Macs to rest if there is such a beast.

157 posted on 02/09/2010 9:00:36 AM PST by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 57 | View Replies]

To: zeugma

So you want me to direct someone to a hacker website. thats illegal and unethical

perhaps you don’t trust apples own security updates.


158 posted on 02/09/2010 9:03:43 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 157 | View Replies]

To: driftdiver
So you want me to direct someone to a hacker website. thats illegal and unethical

Please point out the law to me that says that you cannot direct someone to a 'hacker website'.

Especially when said reference was explicitly requested, and a direct response to said inquiry would explicitly identify the presented URL as being possibly malicious.

Years ago, when I had to use ms-windows computers regularly, I had a collection of viruses and trojans on hand to validate the functionality of anti-virus software. After all, what the heck good is it, if it doesn't actually work?

I don't even own a Mac. I'm a Unix/Linux guy because it suits the way I work better than the alternatives, so I don't even have a dog in this fight. I'm genuinely interested in an actual example of Mac viral and/or trojan code extant on the web. If you can't actually identify same, just say so.

159 posted on 02/09/2010 9:56:20 AM PST by zeugma (Proofread a page a day: http://www.pgdp.net/)
[ Post Reply | Private Reply | To 158 | View Replies]

To: zeugma

there are several identified in the article that haven’t been addressed yet. why dont you look to those?

instead its the same tired argument.


160 posted on 02/09/2010 10:06:43 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 159 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160161-165 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson