Feeds

Speculation mounts over AVG plans for OS X client

'Mac users have no antibodies'

Using blade systems to cut costs and sharpen efficiencies

AVG bosses aren't saying much, but there's new evidence the anti-virus maker is seriously considering building an application for the Mac.

A job posting on the company's website seeks a senior software developer who is familiar with the OS X platform. Responsibilities for the full-time position include the following:

  • adjusting basic system architecture of the AVG product to Mac OS X conditions
  • portation of the AVG technologies to Mac OS X environment
  • cooperation on portation of the AVG product to Mac OS X together with the remote control team

It's by no means the first time there's been speculation that AVG would expand its offerings to the mushrooming base of Mac users. In 2006, ZDNet Australia reported AVG was working on an OS X version, but said it was unclear if it would ever make it out of development labs. In March, more than two years later, SC Magazine reported that AVG execs were still considering the move but remained unsure if a market for such a product even existed.

What remains clear is that the Mac is a bigger target now than it's ever been. Mac-specific trojans such as the RSPlug are updated several times a month and are growing increasingly sophisticated. Social engineering attacks that have plagued Windows users for years are also becoming increasingly common.

And events such as the Pwn2Own hacker contests for the past three years in a row have demonstrated that remote code execution on the platform is immanently eminently possible in the real world so long as there are financial incentives to carry them out.

Even Apple's own support pages advise that Mac users run anti-virus software, though you'd never know that from the smug Mac guy in Apple television commercials, who to this day portrays Windows as the exclusive domain of malware.

AVG Chief Research Officer Roger Thompson declined to discuss his company's plans for the Mac, but did repeat the oft-observed opinion that users are increasingly under siege.

"Mac users have no antibodies," he said. "As Macs gain in popularity, the bad guys will aim at them in greater numbers." ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.