Atlanta Journal-Constitution asks: Is ‘Mac virus’ all just propaganda from Mac haters?

“Attention Mac elitists: your era of virus-free superiority could be ending. Late last week, a supposed ‘Mac virus’ was discovered by anti-virus company Sophos that spread through the iChat program. Earlier today, another virus targeted toward Macs was discovered that could potentially spread through Bluetooth file exchange,” Don Fernandez writes for The Atlanta Journal-Constitution. “What gives here? Mac OS X was supposed to be all but impervious to such nonsense. Could the bullseye long focused on Windows users have finally found fresh meat? Or is it all just propaganda from Mac haters?”

Fernandez asks, “So Mac fans, is this slate of virus hoopla causing concern? And Windows users, is it time to gloat?”

The Atlanta Journal-Constitution article asks for reader feedback below Fernandez’s piece here.

Advertisements:
MacBook Pro. The first Mac notebook built upon Intel Core Duo with iLife ’06, Front Row and built-in iSight. Starting at $1999. Free shipping.
iMac. Twice as amazing — Intel Core Duo, iLife ’06, Front Row media experience, Apple Remote, built-in iSight. Starting at $1299. Free shipping.
iMac and MacBook Pro owners: Apple USB Modem. Easily connect to the Internet using dial-up service. Only $49.
iPod Radio Remote. Listen to FM radio on your iPod and control everything with a convenient wired remote. Just $49.
iPod. 15,000 songs. 25,000 photos. 150 hours of video. The new iPod. 30GB and 60GB models start at just $299. Free shipping.
Connect iPod to your television set with the iPod AV Cable. Just $19.

Related MacDailyNews articles:
Datamonitor: ‘Mac OS is just as vulnerable to malware as Windows’ – February 20, 2006
Patched in mid-2005 by Apple, Symantec warns ‘Inqtana-A’ worm could be ‘beginning of a trend’ – February 20, 2006
OSX.Leap.A: a near miss for Mac users – February 18, 2006
Apple: ‘Leap-A’ not a virus; only accept files from vendors and Web sites that you know and trust – February 16, 2006
‘Highly critical’ flaw in discovered in Symantec AntiVirus for Mac OS X – December 21, 2005
Why Symantec’s ‘scare tactics’ don’t worry Mac users – September 28, 2005
$500 bounty offered for proof of first Apple Mac OS X virus – September 27, 2005
Symantec details flaws in its antivirus software – March 30, 2005
Motley Fool writer: ‘I’d be surprised if Symantec ever sells a single product to a Mac user again’ – March 24, 2005
Symantec cries wolf with misplaced Mac OS X ‘security’ warning – March 23, 2005
Symantec’s Mac OS X claims dismissed as nonsense, FUD – March 22, 2005
Symantec warns about Mac OS X security threat – March 21, 2005
FBI: Viruses, spyware, other computer-related crimes cost U.S. businesses $67.2 billion per year – February 01, 2006
Windows virus threatens 170-year-old Toldeo newspaper’s perfect record, Apple Macs save the day – January 27, 2006
Symantec: 10,866 new Microsoft Windows virus and worm variants in first half 2005 – September 19, 2005
Hackers already targeting viruses for Microsoft’s Windows Vista – August 04, 2005
97,467 Microsoft Windows viruses vs. zero for Apple Mac’s OS X – April 05, 2005
Cybersecurity advisor Clarke questions why anybody would buy from Microsoft – February 18, 2005

40 Comments

  1. Methinks he doth protest too much!

    Plus, there is something rotten in the state of Denmark, and it ain’t the cartoons!

    Reminds me of the famous scene in Blazing Saddles where Slim Pickens happens upon a flatulence contest where he responds,

    “I’d think you guys have just about had enough!”

  2. It’s propoganda and it’s really caused by Apple.

    You see Apple needs us to update our OS, so they can install the more stringent forms of the Trusted Computing inititive, which will take control of our machines out of our hands and into corporations.

    So Apple is leaving these little “holes” in Mac OS X, these anti-malware companies jump and down excited, spread bad press which Apple uses to take the focus of what’s really happening to our machines.

    That’s right kiddies, total lockdown of our machines.

    http://en.wikipedia.org/wiki/Trusted_computing

  3. Here’s a video that sort of explains what’s going to happen.

    http://www.lafkon.net/tc/

    Basically instead of you having control over your own hardware, like being able to download a progam like Toast that does it’s own DVD burning directly to hardware, or Handbrake that does DVD ripping which may be perfectly legal in your country. OS makers in collaboration with industry will automatically decide in advance that you can’t run these programs using EFI.

    Extensible Firmware Interface will contact and download driver updates automatically even before the operating system is loaded.

    It’s a radical shift from what we normally expect a computer to do.

    Right now, just about every Apple application secretly contacts Apple, including the Dock (in 10.4.4), Addressbook, iPhoto, etc etc.

    It’s all in a attempt to soften us to accept Trusted Computing, where Apple decides what’s right for you.

    Instead of you deciding what’s right for you.

  4. Windows users is this time to GLOAT? You’ve got to be kidding. What would they be gloating about. All the non-damage that this non-virus did to the platform. All the non-money we had to spend to fix the non-damage.

    Yeah, come back and see us when there’s a new Mac virus every week, for about 5 years straight then maybe we will kinda maybe sorta be nearly on a portion of the same level of insecurity.

  5. There is a huge differnce between a Trojan that requires a user to allow its entry, and a virus that automatically inserts itself and propogates without user interference.

    The socalled “virii” of late did not attach to the OS, as the hundreds of thousands of virii do with Windows.

    Considering the sophication of the first of these two Trojans, I wouldn’t be surprised at all, if they were written by a Mac security firm, that has been dying on the vine since OSX came out.

  6. So yeah, this virus stuff is bullcrap, no doubt about that. But here’s something to consider…

    What if this website is all just propaganda for Mac-lovers. Thats about what I have to take it as because there are few websites out there that are so one sided when it comes to news.

    Matthew

  7. I think it’s propaganda from the likes of Symantec and other anti-virus software makers. They want to sell more software. I thought it was ridiculous that someone mentioned the Bluetooth worm since I read yesterday that Apple actually sent out a patch for it clear back in mid-2005. DUH! Why’d it get mentioned now?

    http://musobs.blogspot.com/

  8. There are 2 issues at work here, security and AV software marketing. They are related, but not joined at the hip.

    Apple has NEVER marketed it’s computers as impervious to malware and such. It does advertise that it is a UNIX based OS that has a long record for stability and best-in-class security. If you look at the long list of well informed experts on IT that use Macs because of it’s UNIX genes you will see that the reputation is well deserved.

    Should Mac users be cautious? Yes.

    Contrary to the ‘security via obscurity’ myth about Macs, the Mac OS would be the Everest of hackdom. Anyone who could successfully plant and spread a virus through the Mac universe would attain instantaneous rock-star or geek-god status. It would also open 25 million + machines to spam and all the rest.

    Can it be done? Yes. Will it? Only time will tell.

    The issue of self-interest by companies that sell AV software and/or security consulting and services is obvious. Ask someone who makes a living by selling a service if you need it and the answer is going to be yes.

    Do you think the head of Cox thinks everyone should subscribe to their newspapers? Whenever I see some consultant or expert pimping the vulnerability of Macs or their need for particular software, I look to see where their paycheck comes from. Follow the money. That will usually tell you if it is research or marketing.

  9. Well, MacDude, if you’re that concerned over Apple I think it’s time you switched and became a WinDude. Good luck.

    Personally, I have nothing to hide, Apple can do what it wants with my info, if it does such things. I’d rather trust Apple to lock it down that trust the hacker. There will always be those 2 choices.

  10. Instead of plunking down some coinage for any anti-virus software, I’ve decided to get SC4 instead.

    Maybe these guys should look into making money from the Mac crowd selling software in a highly neglected area of Mac computing.

    Just look at all the money Aspyr makes.

    Selling: original games; ported games; game add-ons; repackaged games; best-of game bundles; OEM games…

    MS muscling in on ‘your’ niche? The govt won’t help you, so find another niche. There are no partners in the Windows world. If you are profitable, you are just a moment away from having MS usurp your business.

    Make people happy. Trust me, there’s a lot of money in joy. Games aren’t ‘needed’, yet there’s lots of opportunity and it’s a niche MS can’t dominate.

  11. MacDude – please give it a rest. After what seems like hundreds of posts on the subject, we get the message… The way you constantly attempt to turn unrelated stories such as this one into debates on trusted computing is getting really weary. If readers were interested in your conspiracy theories they would respond and discuss; however, the fact that very few people do should make it quite clear that they’re not.

    Please, do yourself and us a favour and take a time out.

  12. MacDude…
    “Right now, just about every Apple application secretly contacts Apple, including the Dock (in 10.4.4), Addressbook, iPhoto, etc etc.”

    Tinfoil hat a bit tight today? I’m guessing the applications must contact Apple telepathically, or you’d have posted a URL with tcpdump output demonstrating such communications.

  13. Hey MacDude, that video was great! I personally think you’re being ultra-paranoid about it. Just because a Trusted Computing chip is installed in your computer, does not mean it has to be used. If the software vendor chooses to use it, then consumers can choose to use someone else’s software. Just like consumers can choose to only buy CDs that don’t contain copy protection. If you feel your rights are being abused, then don’t buy their product. Simple as that.

    That web site you linked to and all the rhetoric and FUD you spread is worthless unless you can show us examples of how Apple is abusing the TCP for their gain and contrary to consumers personal rights. Seems to me that until you show me a reason I shouldn’t trust Apple, I should make up my own mind about whether I should trust them or not. So far I feel they have done a good job of earning my trust.

    As for the TCP conspiracy, don’t think of use of the TCP as vendors not trusting you, think of it as vendors not trusting people who choose to steal from them. If you don’t steal, then TCP won’t affect you, trust hasn’t been lost between you and the vendor. You only have to worry about trust if you are a thief, and if you are a thief, then you don’t deserve their trust, do you? Compared to root-kit DRM solutions, where honest consumers are the ONLY ones who are being punished, TCP provides benefits to honest consumers, while preventing dishonest ones from being dishonest. I don’t see a downside to this reality. If you don’t agree to the terms provided by the TCP using vendor, then write your own software, or use someone else’s that doesn’t impose TCP restrictions. But don’t assume a vendor is going to abuse your rights, just because they have the means to do so. I may be able to kill someone, but that doesn’t mean I will.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.