Feeds

Mac lambs line up for slaughter

Is Apple airtight?

Internet Security Threat Report 2014

The unveiling of Apple's super-thin MacBook Air promises to expand further the Mac user base. That's troubling news for a platform that, as it enjoys greater uptake, risks the darker side of fandom - stalkers. Or, in this case, hackers and virus writers.

Security specialist F-Secure's latest claim to have discovered the first rogue program for the Apple Macintosh - MacSweeper - comes only weeks after it reported it's finding an alarming increase in the quantity of malware written for the Mac.

The MacSweeper scam - a Mac version of the false security scan familiar to Windows users - surfaced last month when some Mac users noticed the program had sneaked into their Mac OS/X systems.

The scammers cheekily stole the MacSweeper name from an obscure open source Mac clean-up utility program that has been available free since 2004. Whether consciously or not, they managed to exploit the confusion among some naive Mac users.

Apple users are, ahem, traditionally overly confident about their platform's security capabilities and F-Secure's report was dismissed as a cynical ploy to sell security protection.

This is a common criticism of security software companies. But the MacSweeper scam - while not an actual security breach - does highlight the possibility that the Mac's increased sales last year have made it a more attractive target for hackers.

Security specialist Secunia also noted that a small increase in Macintosh security problems in 2007 and a recently highlighted flaw in Quicktime - that still awaits a fix - raises questions about the Mac community's view of security issues.

Last month, Apple's attitude to security fixes was questioned and the criticism again rejected by Mac users with snooty assertions that Mac OS/X was secure - or at least a lot more secure than Microsoft Windows systems. So much so that there is a potentially huge contract waiting for Apple to supply the US military with Macs mainly because they are seen as more secure than PCs.

Apple has, of course, always maintained it takes security seriously. The recent Leopard release of Mac OS/X included new security features that were followed with updates in December.

The problem is that no matter how secure software is, there is always a way to break it and there will always be those who see it as a challenge. Times change, and Apple's growing user community cannot afford to be smug.®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.