Linked by Thom Holwerda on Tue 1st Mar 2011 00:28 UTC
Mac OS X It's sad to see that even after all these years, we still have to write articles like this one. It's all over the web right now: a new backdoor Mac OS X trojan discovered! Code execution! Indicative of rise in Mac malware! Until, of course, you actually take a look at what's going on, and see that not only is it not in the wild, it can't really do anything because it's a beta.
Thread beginning with comment 464402
To read all comments associated with this story, please click here.
by Aussie_Bear on Tue 1st Mar 2011 10:19 UTC
Member since:

Like politicians, security companies are not to be trusted, and are probably the worst scum in the software industry.

Agreed! They are scum. On the same level as dodgey used car salesmen or garages.

It doesn't matter which OS you use, they will ALWAYS come up with FUD in order to sell their crap.

They rely on people not knowing how to use their systems with security practices in mind.

They don't sell prevention. They sell cures. Because prevention isn't a profitable model! Cures are!

They always use their "Boogie Man" or "End of the World" tone!

Back in 2006, Kaspersky tried to FUD Linux folks...

As well as OpenOffice...

Example from 2008: Mac, Linux, BSD open for attack: Kaspersky

We can pretty much presume => Eugene Kaspersky = SUPER SCUM

Can the malware industry be trusted?
(If they have to, they'll pull numbers out of the butt to FUD!)

I undermine AV companies by teaching people in my local area of good practices that prevent infection.

For example: I teach Windows users to...
=> Upgrade to Windows XP/7 Professional
=> Apply Software Restriction Policy and set to "disallow" (Whitelist mode)
=> Set Limited/Standard User
=> Password the default Admin-level account.
=> Apply MS's Enhanced Mitigation Experience Toolkit to browsers, Adobe Reader, and certain Windows services.
=> The usual practices like staying updated, only installing from legit sources, making weekly back-ups, only use Limited/Standard user for daily use, etc.
=> Show people examples of social engineering. (The premise being: The more you know, the less likely you'll fall for this nonsense.)

For Linux, I usually have two accounts; One has access to sudo or root privileges. The other does not...I also look into what is standard security practice. (Reading books, asking folks who are more experienced than I am, etc.)

If I had a Mac, I would very likely go here...
...And become familiar the features or tools in OSX.

The only way to destroy lies and fear is with the truth and knowledge. Teaching people prevention will hurt AV companies at the core level of their business.

Reply Score: 1

RE: Agreed!
by kaiwai on Wed 2nd Mar 2011 09:42 in reply to "Agreed!"
kaiwai Member since:

You're surprised? before they even made themselves known to the west part of scaring the crap out of people was part of their whole marketing campaign - scare the living crap out of people with an unlikely scenario them ride to the rescue with a product that'll 'stop it from happening'. Given the dishonest and underhanded tactics it wouldn't surprise me if they wrote some malware and virus's themselves simply to ratchet up the paranoia level - tobacco company owning a large share in a company that makes nicotine patches for those trying to give up smoking. Create a problem and provide a solution.

Edited 2011-03-02 09:43 UTC

Reply Parent Score: 2