If there is a question that still surprises people, the "apple get viruses" is. It is a myth that has been successfully for more than a decade is perpetuated. In short, any piece of software can be hacked, including Apple's operating system. Various reasons that this myth a lot of ordinary users is considered one of a number of fact. Here to stay and something to prove this myth that Mac users certainly should have an anti-virus software installed on your computer that is on real-life example is a closer look at.
It is important to note that the Mac is still far more secure than Windows, but Apple is supposed to get viruses. Mac Unix kernel, which for long has been known to provide the most secure operating system has been built on, although it is the oldest. To make things even more secure, virus writers for most IBM platform that is used by Windows are more familiar with. This means that when they create a virus, it will target only Microsoft products. Along with personal knowledge, scripts and other tools used by hackers to create viruses are designed to attack Microsoft Windows. When all are added together, the result is that the Mac is more secure, but Apple still get viruses.
Some examples of recent viruses designed for Apple
Before we get into specific virus, it is important to note that if you are running Windows emulates a virtual PC which if you have any viruses that Microsoft's goal is likely. Even better known virus that attacks Apple over the years are just a few.
Foxit Reader Twin
In 2009, a malware program for the Foxit Reader (free PDF viewer) for the Macintosh have killed many people claim. Foxit time, only Windows, U3, and was available for Linux. Foxit Reader for viruses designed specifically for Apple claimed to be. This Trojan is a variant of DNS JAHLAV that was rerouted users to phishing sites.
iBotnet
The virus first major sign that the virus attacks on Macs with a greater frequency was considered to have been started. Time, it is small enough and some people will find that they had never considered was that the Trojan. However, it is a template that other more harmful viruses targeting Apple was built around. For example, there is a built-in security features to the Mac was all passive design, stole passwords, and even with built-in camera can take pictures.
If you're wondering how Apple for such viruses, it is normally installed another program and parent programs, within the virus is downloaded.
More and more people turning to Apple instead of Windows, with the number of viruses created specifically for Macs will continue to grow. In the past, computer, Windows, about 90% of users believe that Macs have not an attractive target. However, as more people switch from Microsoft to Apple continues, there is no doubt that will increase the number of potential threats is not.
http://articles.mercola.com/members/jaynis88/default.aspx
http://www.chequer-board.net/user/siaren45
http://ibadanculturalstudiesgroup.org/?q=user/6654
http://writeaboutit.com/user/Profile.aspx?UserID=63903
http://www.planetwatt.com/profile/1928
http://www.cbs6albany.com/share/profiles/?slid=433b87d6-6047-d704-3df3-7a17df3b0c21&plckPersonaPage=BlogViewPost&plckUserId=433b87d6-6047-d704-3df3-7a17df3b0c21&plckPostId=Blog%3a433b87d6-6047-d704-3df3-7a17df3b0c21Post%3a3fb5e1e9-daa6-477f-bfd7-8e1a01769c49&plckController=PersonaBlog&plckScript=personaScript&plckElementId=personaDest
http://www.planetwatt.com/profile/1926
http://www.livermorereport.com/members/surjan33.aspx
http://www.dotmates.com/users/jaynis88
http://www.wilsonpages.com/cs/members/parkar91.aspx
http://ibadanculturalstudiesgroup.org/?q=user/6649
http://www.cbs6albany.com/share/profiles/?slid=595a20c7-3e0e-2b94-fdc4-bf8ee1242961&plckPersonaPage=BlogViewPost&plckUserId=595a20c7-3e0e-2b94-fdc4-bf8ee1242961&plckPostId=Blog%3a595a20c7-3e0e-2b94-fdc4-bf8ee1242961Post%3a1dc76dfd-dfa8-45de-9267-2325ee678521&plckController=PersonaBlog&plckScript=personaScript&plckElementId=personaDest
http://semwebcentral.org/people/viewprofile.php?user_id=125994
http://www.chequer-board.net/user/larsen87
http://www.threadless.com/profile/1609147/siaren45
http://www.planetwatt.com/profile/1925
http://ibadanculturalstudiesgroup.org/?q=user/6648
http://205.234.70.203/user/Profile.aspx?UserID=197616
http://cs.phelan.mobi/members/surjan33/default.aspx
http://www.edisonnation.com/users/larsen87/blog_entries/larsen87
http://www.planetwatt.com/profile/1923
http://www.bttradespace.com/profile/personal/larsen87
http://sarbhai.saxenafamily.com/user/surjan33.html
http://www.tripconnect.com/profile/jaynis88
http://www.drustvo-vodarjev.si/Forum/members/surjan33.aspx
http://www.profilepic.com/markas41/
http://www.fandy.com/users/larsen87
http://www.drustvo-vodarjev.si/Forum/members/jaynis88.aspx
http://semwebcentral.org/people/viewprofile.php?user_id=126021
http://205.234.70.203/user/Profile.aspx?UserID=197607
http://itboard.ro/members/huagye8/default.aspx
http://www.daytoncircus.org/?q=user/2271
http://ibadanculturalstudiesgroup.org/?q=user/6647
http://www.profilepic.com/aditya30/
http://www.hercampus.com/users/surjan33
http://semwebcentral.org/people/viewprofile.php?user_id=125986
http://www.bttradespace.com/profile/personal/aditya30
http://www.edisonnation.com/users/surjan33/blog_entries/surjan33
http://www.cbs6albany.com/share/profiles/?slid=d8312f70-825d-db84-0118-6c496974d9d6&plckPersonaPage=BlogViewPost&plckUserId=d8312f70-825d-db84-0118-6c496974d9d6&plckPostId=Blog%3ad8312f70-825d-db84-0118-6c496974d9d6Post%3a798a71c6-b3b3-44e1-928e-b0bcdafd4a65&plckController=PersonaBlog&plckScript=personaScript&plckElementId=personaDest
http://cs.phelan.mobi/members/huagye8/default.aspx
http://www.cbs6albany.com/share/profiles/?slid=e0543184-287b-3994-515a-1b9d9b645076&plckPersonaPage=BlogViewPost&plckUserId=e0543184-287b-3994-515a-1b9d9b645076&plckPostId=Blog%3ae0543184-287b-3994-515a-1b9d9b645076Post%3a21fe7cf5-e8bf-4520-92dd-aa69034f6819&plckController=PersonaBlog&plckScript=personaScript&plckElementId=personaDest
No comments:
Post a Comment