Linked by HAL2001 on Thu 19th May 2011 12:10 UTC
Privacy, Security, Encryption "A little over two weeks have passed since the appearance of MAC Defender, the fake AV solution targeting Mac users. And seeing that the approach had considerable success, it can hardly come as a surprise that attackers chose to replicate it. This time, the name of the rogue AV is Mac Protector, and the downloaded Trojan contains two additional packages. As with MAC Defender, the application requires root privileges to get installed, so the user is asked to enter the password."
Permalink for comment 473733
To read all comments associated with this story, please click here.
RE: We told you so
by gfolkert on Thu 19th May 2011 13:57 UTC in reply to "We told you so"
gfolkert
Member since:
2008-12-15

Not particularly.

These equivalent programs get installed in Windows without the "root" privileges.

This means that privilege separation in Windows is just Palin broken and has been since they broke Ring 0.

If these users automatically put in the password when they don't know what in hell they are installing in the first place... then this is not a real problem with the OS design, but with the person operating the machine.

Someone installing a program outright in OSX regardless of its supposed or real intent does not constitute an OS design flaw.

Reply Parent Score: 3