But Apple is now working to prevent them. It recently issued a fix for the Flashback infection after it became apparent just how huge it was. The Cupertino, California-based company is now teaming up with security specialists Kaspersky to identify other vulnerabilities.
Nikolai Grebennikov, Kaspersky’s Chief Technology Officer (CTO), told Computing.co.uk:
“Mac OS is really vulnerable. Apple recently invited us to improve its security. Kaspersky has now begun an analysis on Mac OS X’s vulnerabilities and the malware that’s targeting them.”
However, despite the partnership, Grebennikov was not too complimentary about Apple. He criticized Apple’s lack of “seriousness” when it comes to security, which paved the way for Flashback to spread. Grebennikov blamed Apple’s decision to block Java updates from Oracle:
Apple blocked Oracle from updating Java on Mac OS, and they perform all the udpates themselves. They only released the patch a few weeks ago – two or three months after the Oracle patch. That’s far too long.
Grebennikov made a surprising statement about iOS:
Our experience tells us that in the near future, perhaps in a year or so, we will see the first malware targeting iOS.
Because of Apple’s “closed” approach to iOS, which sees every app vetted and approved before making its way into the App Store, it seems it would be extremely difficult for hackers to get their malware onto iPhones, iPod Touches, and iPads. One would assume that the only iOS devices immune to malware are those installing apps via unofficial sources through jailbreaking.
With Apple now working alongside Kaspersky to fight Mac infections. There is a hope that future vulnerabilities are ironed out quicker than they have been in recent years.
Source: Cult Of Mac