It is important to note that the Mac is still far more secure than Windows, but Apple is supposed to get viruses. Mac Unix kernel, which for long has been known to provide the most secure operating system has been built on, although it is the oldest. To make things even more secure, virus writers for most IBM platform that is used by Windows are more familiar with. This means that when they create a virus, it will target only Microsoft products. Along with personal knowledge, scripts and other tools used by hackers to create viruses are designed to attack Microsoft Windows. When all are added together, the result is that the Mac is more secure, but Apple still get viruses.
Some examples of recent viruses designed for Apple
Before we get into specific virus, it is important to note that if you are running Windows emulates a virtual PC which if you have any viruses that Microsoft's goal is likely. Even better known virus that attacks Apple over the years are just a few.
Foxit Reader Twin
In 2009, a malware program for the Foxit Reader (free PDF viewer) for the Macintosh have killed many people claim. Foxit time, only Windows, U3, and was available for Linux. Foxit Reader for viruses designed specifically for Apple claimed to be. This Trojan is a variant of DNS JAHLAV that was rerouted users to phishing sites.
iBotnet
The virus first major sign that the virus attacks on Macs with a greater frequency was considered to have been started. Time, it is small enough and some people will find that they had never considered was that the Trojan. However, it is a template that other more harmful viruses targeting Apple was built around. For example, there is a built-in security features to the Mac was all passive design, stole passwords, and even with built-in camera can take pictures.
If you're wondering how Apple for such viruses, it is normally installed another program and parent programs, within the virus is downloaded.
http://www.investmentyogi.com/members/reeves45.aspx
http://www.celsias.com/people/willom-w/
http://thelibel.com/members/willom77.aspx
http://blogs.opisnet.com/members/kailss33.aspx
http://www.techtechboom.com/users/reeves45
http://indigo.betacode.ru/members/jallyy37.aspx
http://ivoh.org/users/reeves45
http://dagblog.com/users/reeves45
http://baldandbitter.com/?q=user/3526
http://ryancrossman.net/members/kailss33.aspx
https://opendata.socrata.com/profile/willom77/ytfy-keeg
https://www.capemaycountyherald.com/user/kailss33
http://kuachu.net/users/kailss33
http://social.eyeforpharma.com/users/reeves45
http://hanson-family.us/members/reeves45.aspx
http://www.celsias.com/people/kailss-k/
http://ryancrossman.net/members/jallyy37.aspx
http://usa.milesplit.com/members/willom77
http://www.quibblo.com/user/reeves45
http://usa.milesplit.com/members/reeves45
http://community.allocatus.com/members/jallyy37.aspx
http://indigo.betacode.ru/members/willom77.aspx
http://myamericommerce.com/members/willom77.aspx
http://www.rlac.eu/cs/members/willom77.aspx
http://www.memsaab.com/users/kailss33
http://www.celsias.com/people/jallyy-j/
http://www.memsaab.com/users/jallyy37
http://kuachu.net/users/willom77
No comments:
Post a Comment