Login
не ужели правда?
2018 просмотров
Перейти к просмотру всей ветки
in Antwort дактиль 04.10.09 21:58
В ответ на:
Mac OS X
The growing interest to Mac OS X on the part of cyber criminals has been observed since the beginning of 2009. The first outcome of this interest was the Mac.Iservice Trojan that added compromised Macs to a botnet. It was the first case of a botnet consisting of machines running Mac OS X (the iBotnet).
The spring saw a wave of other malicious programs for Mac. Those were Mac.DnsChange trojans that were sperad as links to a malicious video clip. Twitter became one of the channels used to distribute the link.
Activation of the malicious video clip allowed detecting the target operating system using the User-Agent data. After detection of the platform a user was offered a corresponding file √ a malicious program for Windows or for Mac OS X.
As popularity of Mac OS X grows among users, so it does among cyber-criminals. By now the number of threats for Mac OS X is not nearly large enough to be compared with the number of threats targetting Windows. However, the situation may change in the future.
http://news.drweb.com/show/?i=399&c=5
Mac OS X
The growing interest to Mac OS X on the part of cyber criminals has been observed since the beginning of 2009. The first outcome of this interest was the Mac.Iservice Trojan that added compromised Macs to a botnet. It was the first case of a botnet consisting of machines running Mac OS X (the iBotnet).
The spring saw a wave of other malicious programs for Mac. Those were Mac.DnsChange trojans that were sperad as links to a malicious video clip. Twitter became one of the channels used to distribute the link.
Activation of the malicious video clip allowed detecting the target operating system using the User-Agent data. After detection of the platform a user was offered a corresponding file √ a malicious program for Windows or for Mac OS X.
As popularity of Mac OS X grows among users, so it does among cyber-criminals. By now the number of threats for Mac OS X is not nearly large enough to be compared with the number of threats targetting Windows. However, the situation may change in the future.
http://news.drweb.com/show/?i=399&c=5
по идее под любую ось при желании можно вирус настрочить))
http://pbrus.org