Linked by HAL2001 on Thu 19th May 2011 12:10 UTC
Privacy, Security, Encryption "A little over two weeks have passed since the appearance of MAC Defender, the fake AV solution targeting Mac users. And seeing that the approach had considerable success, it can hardly come as a surprise that attackers chose to replicate it. This time, the name of the rogue AV is Mac Protector, and the downloaded Trojan contains two additional packages. As with MAC Defender, the application requires root privileges to get installed, so the user is asked to enter the password."
Permalink for comment 473749
To read all comments associated with this story, please click here.
RE[3]: Can't get excited
by Neolander on Thu 19th May 2011 15:12 UTC in reply to "RE[2]: Can't get excited"
Member since:

Happy to see that I'm not alone wanting OSs to work that way ;)

Though I would rather not incorporate the privileged/nonprivileged status of API calls at the function name level on my side. There would just be a set of default privileges, like "Accessing ~/.%APPNAME%" on an unice, that would be granted to everyone and would be well-documented in the API doc.

This would in turn allow new backwards-incompatible releases to change the set of default privileges, if experience shows that there was a mistake in it somewhere.

Edited 2011-05-19 15:14 UTC

Reply Parent Score: 1