Apple MAC OSX won’t pose serious security threat as critical as Microsoft Windows Vista, is this true?

Apple OSX Ceres asked:

What is/are the likely threat would MAC OSX be surfaced? How about those desktop add-ons applications where users are advised to take immediate action to be aware of?

Content for WordPress

3 replies
  1. mjet214 says:

    A security threat on Mac OSX isn’t imminent as on Windows. The only reason for this is that most people don’t develop viruses and what not for operating systems like Mac or Linux. Windows is generally targeted because of its large user base.

  2. snakeeyes says:

    Mac OS X is based on Unix and Unix is known for its great security features and stability, windows has a number of design flaws and has absolutely no security.

    Microsoft doesn’t know what security is for example there is no reason for notepad.exe to want to access the internet right? I mean why would a text editor want to access the internet but in Windows even notepad has internet access.

    Mac OS X knows how to handle security much better cause of permissions to access files and different users all can’t be administrator and stuff. Windows NT was designed with the idea that there will only be 1 pc user and they would be administrator but Unix was designed with the idea that there will be loads of users and only ONE administrator will have complete access to the machines.

    All this stuff about Windows being targeted because its market share is more is not true according to me, its because windows security sucks, even a baby could break in to windows.

  3. 5566 says:

    Symantec antivirus detects a flaw in Apple MAC OSX (10.4.0 through 10.4.9) mDNSResponder as a serious security threat.

    This service is prone to a remote buffer-overflow vulnerability.

    The issue resides in the UPnP IGD code used to create port mappings on home NAT gateways in the OSX mDNSResponder implementation.

    A remote attacker may exploit the issue by submitting maliciously crafted packets to victims.

    The affected service is automatically restarted if it crashes, giving attackers multiple chances to exploit this issue to execute code.

    Others, for instance :-

    a vulnerability in Yahoo! Messenger’s Webcam, Adobe Acrobat, Firefox Web browser.

    a directory traversal vulnerability in the Singapore Image Gallery application.

    a heap based overflow vulnerability in Apple QuickTime and iTunes.

    a buffer overflow vulnerability in the ActivePerl Perl, Yahoo! WebCam ActiveX control.

    a code injection vulnerability in the Google Toolbar.

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply