Mac users can often be heard to say “I don’t need antivirus software, I have an Apple”. Unfortunately, this is a misguided conclusion. Whilst the dangers are certainly much less than with Windows computers, they do exist nonetheless. If nothing else, the recent spread of Mac Trojans proves this. Mac users who think they do not need to concern themselves have created an illusion. The claim that Apple users are less threatened than Windows users is currently still correct but could change rapidly. It was the low market share of Macs that limited the attention of online criminals; now that Macs are becoming more popular, this state of affairs is changing. Something that many people forget is that phishing works equally well on any device with an integrated browser, regardless of whether this is Windows, Mac, Apple TV, Android, Symbian, or Internet TV; phishing affects everyone equally.
The largest single case was the Flashback-Botnet, which affected over half a million Macs at the beginning of 2012. This may not sound like much, and indeed is not very much compared to the world of Windows computers, but only shows the tip of the iceberg. Macs are being attacked more and more by cybercriminals, who take advantage of the complacency towards malware threats amongst Mac users. Unlike Windows users, most Mac users do not have any additional protection against viruses on their computers.
As in the world of Windows, effective free antivirus programs are available for the Mac.
Computer Medic On Call is committed to bringing you the highest quality computer service available for all of your information and systems needs. Serving in Broward and West Palm Beach in Florida State for IT Support. Our experience provides us with the skills to offer a range of high quality computer services.
621 N.W. 53rd Street
Suite 125
Boca Raton, FL 33487
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
1 comment. Leave new
[…] the attack vector makes this particular form of ransomware less threatening than many of the others, it’s one more reason to make sure every machine on your […]