Do you have adblock enabled?
 
If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(International Business Times)   Macs are just as vulnerable to hacks as PCs   ( ibtimes.com) divider line
    More: Obvious, Operating system, Macintosh, necessary firmware updates, Apple Inc., Mac OS, consumers necessary firmware, out-of-date firmware, built-in software  
•       •       •

1956 clicks; posted to Geek » on 01 Oct 2017 at 7:25 AM (10 weeks ago)   |   Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



Voting Results (Funniest)
View Voting Results: Smartest and Funniest

2017-10-01 07:51:38 AM  
6 votes:
Bragging about Macs and less vulnerable is like me bragging about Linux and being less vulnerable...yeah, we're not really less vulnerable, just single digit market percentage...ain't nobody got time to write a virus for single digit market percentage...especially since the exploit being targeted will be patched within 24 hours of being disclosed to the public on most major Linux distributions.

Or, you know, run Windows where exploits cross generations and OS versions.  I still come across the occasional article about Windows 7/8/10 running into Windows 3.1/95 era bugs...because, you know, an OS still dealing with bugs from the early 90s is what I want to run to do secure, financial transactions and keep me private.

Hacking-wise, Linux and Macs are like high end cars and Windows is like a 1990 Toyota Camry.  You can steal a Ferrari or a BMW, but it's 1000x easier to steal a 1990 Toyota Camry since they can be started and driven off with nothing but long fingernails...keys aren't required in that car...seriously, I used to own one.
2017-10-01 08:51:25 AM  
5 votes:
One of the attacks that specifically makes use of out-of-date firmware is the Thunderstrike attack, which allows a malicious actor to take control of the machine by inserting an ethernet adapter into a Mac's Thunderbolt port to deliver a malicious payload

Don't leave your older Macbook unattended at Starbucks
2017-10-01 08:22:35 AM  
4 votes:
Fark needs a "no shiat Sherlock" tag, because the obvious tag exploded into a million Romeros.
2017-10-01 05:24:18 AM  
4 votes:
4.2% of two-year-old computers *may* be vulnerable. "Just as vulnerable". Right.
2017-10-01 09:27:25 AM  
3 votes:

skozlaw: How did the whole "Mac" and "PC" nomenclature come about, anyway? If it's hardware, wouldn't the better comparison have been "Apple" and "IBM" or "Intel"? And why does it persist when it seems to now refer to "OSX" vs "Windows"?


It originated in the 80s when basically anyone could build PCs and their peripherals but Apple was super proprietary about their format. There was a time when if you owned an Apple computer you had to use an Apple HD, printer, etc. Other formats existed (Atari, Commodore, etc.) but PCs composed the majority of the market with Apple a very distant second. Apple's defense of this policy was that it was necessary to maintain quality and ensure the computers were easy to use (DOS based PCs were not exactly user friendly), however it can't be ignored that Apple computers and accessories were far more expensive than comparable PCs (for example, when I upgraded to a PC from my Atari in 1990 the comparable Apple was over 3 times the cost).

Prior to the iPod and iPhone this was a common description of Apple's proprietary strategy:

Arrogance
Produces
Profit
Losing
Entity
2017-10-01 08:20:08 PM  
2 votes:

griz13: No shiat Sherlock


img.fark.netView Full Size


I remember not using it for shiat, either
2017-10-01 12:58:52 PM  
2 votes:

veale728: Macs are just as vulnerable, yes. Windows machines have a higher likelihood of attacks though, because of the higher marker share


It has nothing to do with marker (sic) share.  Linux and Macs get the same number of attacks these days.  However - you are more likely to find an out of date Windows box than an out of date linux or Mac just due to historical reasons.

/so please stop pushing this fallacy
//these days you are more likely to find an out of date cable box to exploit than Windows
2017-10-01 04:28:59 PM  
1 vote:

theflatline: ...the IBM 5150...


I always thought early PC users were insane.
2017-10-01 12:25:34 PM  
1 vote:

Tyrosine: skozlaw: How did the whole "Mac" and "PC" nomenclature come about, anyway? If it's hardware, wouldn't the better comparison have been "Apple" and "IBM" or "Intel"? And why does it persist when it seems to now refer to "OSX" vs "Windows"?

It originated in the 80s when basically anyone could build PCs and their peripherals but Apple was super proprietary about their format. There was a time when if you owned an Apple computer you had to use an Apple HD, printer, etc. Other formats existed (Atari, Commodore, etc.) but PCs composed the majority of the market with Apple a very distant second. Apple's defense of this policy was that it was necessary to maintain quality and ensure the computers were easy to use (DOS based PCs were not exactly user friendly), however it can't be ignored that Apple computers and accessories were far more expensive than comparable PCs (for example, when I upgraded to a PC from my Atari in 1990 the comparable Apple was over 3 times the cost).

Prior to the iPod and iPhone this was a common description of Apple's proprietary strategy:

Arrogance
Produces
Profit
Losing
Entity


The same company sitting on hundreds of billions in cash, has no debt, and makes obscene profits every year.
2017-10-01 12:08:20 PM  
1 vote:

joshiz: 4.2% of two-year-old computers *may* be vulnerable. "Just as vulnerable". Right.


BSABSVD!
2017-10-01 11:30:01 AM  
1 vote:
Plus I'm one of those middle aged "veteran of the browser wars" who gets his panties in a bunch and insists that kids today don't understand what it was like then. And then swills some whiskey, and starts on yet another tale of the shiatty old days...
2017-10-01 10:19:23 AM  
1 vote:
Heh, I've been reading "Macs are just as vulnerable as PCs" headlines for 20 years.

In a lab? Sure.

In the real world? I'll believe it when I see it.
2017-10-01 09:32:26 AM  
1 vote:

Tyrosine: their peripherals but Apple was super proprietary about their format


Well, I think more than that, Apple was super unwilling to adopt other people's proprietary formats. That's why they went with Firewire over USB at points. USB was alsoproprietary, but Intel was more open about licensing it (because they wanted adoption). It's why they adopted SCSI. And while the ADB was definitely proprietary, at the time, it's not like there was much of a mass-market, widely adopted protocol out there for peripherals.
2017-10-01 09:30:01 AM  
1 vote:
It's not just that Macs or less vulnerable, its more than that just on a worthwhile Target. Sure you can get some buddies little dinky music program to shut down and steal their "Beats", or lock some artist out of their digital files. But there's no real valuable information on most Macs.

It's not just the smaller market share, it's also the "why bother" infecting some douchebag hipster's Mac. If they can afford a Mac in the first place, they will probably just throw it out and buy a new one, cuz that's what Apple users do. It's not like you can repair or upgrade them.
2017-10-01 08:26:25 AM  
1 vote:
Rather amusing. When I was working with Apple computers in the '80s, they were the worse for infections. People loaded any crap they came across. Since this was a government job, only the support team was authorized to add software, but cleanups and rebuilds were a daily thing.

/NASA "manager" was the worst offender, her system rarely ran for more than a week before she added something that crashed it.
 
Displayed 15 of 15 comments

View Voting Results: Smartest and Funniest

This thread is closed to new comments.

Continue Farking

On Twitter





Top Commented
Javascript is required to view headlines in widget.
  1. Links are submitted by members of the Fark community.

  2. When community members submit a link, they also write a custom headline for the story.

  3. Other Farkers comment on the links. This is the number of comments. Click here to read them.

  4. Click here to submit a link.

Report