Why Apple, Inc Doesn’t Worry About Viruses
Matthew Long
As many have heard, Macintosh Computers, and more in general Apple Inc., is beginning to really take flight in consumer households. The overwhelming numbers of available viruses to Windows computers, phones, and Android devices surpasses the millions. In fact, in April of 2012, Symantec released a report noting its latest Virus definitions file that contained 17,702,868 separate signatures (Bott). This number seems quite ridiculous regarding the amount of viruses available. However, the same report given by Symantec 8 days earlier only reported 17,595,922 virus definitions, meaning that 106,946 definitions were released in just over a week (Bott). With the information given by Symantec, which is reported frequently, why do computer shoppers still purchase Windows and Android devices? Is it simply because they are cheaper? Or is it the possibility that they don’t know what else is available to them? Many users are not “in the know” about why Windows computers get viruses so easily, and why Macs do not. Let’s begin with Windows.
Just like in the human body, a virus can spread throughout a person’s computer, sometimes without a fighting chance, and become contagious to any other computers on the network or to others via email. There are three main types of “destructive” or “annoying” categories that can be downloaded via the internet or an email. They are Trojan horses, worms, and viruses. “In many cases, e-mail viruses are not "true" viruses because they cannot replicate without human interaction” (How Stuff Works). Trojan horses can simply hide the destructive application in a “package” that must be opened. Usually the package will come in the form of an attached, misleading application that the attacker will prompt the user to open. Once opened, this trojan can be so dangerous as to find the other contacts in your address book and send
Cited: Apple, Inc (2013). Features in OS X. Retrieved from https://developer.apple.com/technologies/ mac/lion.html Apple, Inc (2013). Safety. Built right in. Retrieved from http://www.apple.com/osx/what-is/ security.html Arora, M. (2012, May 7). How secure is AES against brute force attacks? Retrieved from http:// www.eetimes.com/design/embedded-internet-design/4372428/How-secure-is-AES- Brain, M. & Fenlon, W. (2013). How Computer Viruses Work. Retrieved from http:// computer.howstuffworks.com/virus.htm How Stuff Works, Inc (2013). How do viruses and worms spread in e-mail? Retrieved from http://www.howstuffworks.com/question339.htm Simon, M. (2012, February 24). What is Sandboxing? Retrieved from http://www.maclife.com/ article/blogs/what_sandboxing Singh, A. (Aug 2004). A Taste of Computer Security. Retrieved from http:// www.kernelthread.com/publications/security/uw.html