Linked by Thom Holwerda on Tue 1st Mar 2011 00:28 UTC
Mac OS X It's sad to see that even after all these years, we still have to write articles like this one. It's all over the web right now: a new backdoor Mac OS X trojan discovered! Code execution! Indicative of rise in Mac malware! Until, of course, you actually take a look at what's going on, and see that not only is it not in the wild, it can't really do anything because it's a beta.
Permalink for comment 464402
To read all comments associated with this story, please click here.
Agreed!
by Aussie_Bear on Tue 1st Mar 2011 10:19 UTC
Aussie_Bear
Member since:
2006-01-12

Like politicians, security companies are not to be trusted, and are probably the worst scum in the software industry.

Agreed! They are scum. On the same level as dodgey used car salesmen or garages.

It doesn't matter which OS you use, they will ALWAYS come up with FUD in order to sell their crap.

They rely on people not knowing how to use their systems with security practices in mind.

They don't sell prevention. They sell cures. Because prevention isn't a profitable model! Cures are!

They always use their "Boogie Man" or "End of the World" tone!

Back in 2006, Kaspersky tried to FUD Linux folks...
=> http://www.linux.com/archive/feature/53534
=> http://www.linux.com/archive/articles/53727

As well as OpenOffice...
=> http://www.linux.com/archive/feature/54824

Example from 2008: Mac, Linux, BSD open for attack: Kaspersky
=> http://www.computerworld.com.au/article/264352/mac_linux_bsd_open_a...

We can pretty much presume => Eugene Kaspersky = SUPER SCUM

Can the malware industry be trusted?
=> http://www.linux.com/archive/feature/54886
(If they have to, they'll pull numbers out of the butt to FUD!)

I undermine AV companies by teaching people in my local area of good practices that prevent infection.

For example: I teach Windows users to...
=> Upgrade to Windows XP/7 Professional
=> Apply Software Restriction Policy and set to "disallow" (Whitelist mode)
=> Set Limited/Standard User
=> Password the default Admin-level account.
=> Apply MS's Enhanced Mitigation Experience Toolkit to browsers, Adobe Reader, and certain Windows services.
=> The usual practices like staying updated, only installing from legit sources, making weekly back-ups, only use Limited/Standard user for daily use, etc.
=> Show people examples of social engineering. (The premise being: The more you know, the less likely you'll fall for this nonsense.)

For Linux, I usually have two accounts; One has access to sudo or root privileges. The other does not...I also look into what is standard security practice. (Reading books, asking folks who are more experienced than I am, etc.)

If I had a Mac, I would very likely go here...
=> http://www.apple.com/support/security/guides/
...And become familiar the features or tools in OSX.

The only way to destroy lies and fear is with the truth and knowledge. Teaching people prevention will hurt AV companies at the core level of their business.

Reply Score: 1