Malware called "MetaStealer" is being used by hackers to attack businesses and to steal data from Intel-based Macs, with techniques including posing as legitimate app installers.
The thing is that Windows is still more used than osx. So naturally it’s going to be targeted more. Especially since more businesses use Windows than osx too.
I’ve come across Linux malware in my time in cyber Sec. If it exists, it’ll have malware.
That’s true, but macs also do have more security controls, configured more sensibly by default. BitLocker, the system’s full disc encryption feature for example, is still considered a premium product reserved for more expensive editions, whereas macs, android, and iOS have had it standard and default enabled (the latter two with no option to disabled it) in current versions for years. Windows still does not require (or last I checked even offer) things like application sandboxing or runtime hardening by default (this may well have changed in the past couple of years, but I’ve heard nothing of it). While the Universal Windows Platform does have a functional permissions system, that whole platform is (as I understand it) limited to the Microsoft store (which as I understand is ignored by vendors), and the last time I looked at it, it was a mess. There are other such things. Which isn’t to say macs can’t get malware, they can, and they’ll get more malware as time goes on. There are other measures set up on Windows but not macOS, but they don’t appear to be as effective to me, and they seem to be mainly focused on reacting to specific incidents. Security-wise, the two really are not the same.
Drive encryption doesn’t really matter to malware, since the disk must be decrypted to function when turned on. Also the majority of malware still runs in userland, maybe arguably more since the rise of ransomware.
I’m not sure what you mean by permissions being limited to the Microsoft store exactly, but there’s a very robust permissions system built into Windows by default. It’s just not very user friendly, and your average user wouldn’t know it exists probably.
There’s arguments on both sides about default security policies anyway, as I’ve found navigating osx systems to install software can often be a nightmare - but that could be due to my lack of experience with it directly.
Both systems have pros and cons from a security standpoint. In the corporate spaces I’ve worked in, osx security is more annoying to manage from a central point than Windows.
In the phrase “security through obscurity”, obscurity means obscuring how the system works, eg making the source code secret. Mac being less popular has nothing to do with security through obscurity. The argument is that a less deployed platform is a less valuable target, which is absolutely true.
Some people say there’s no malware for macOS and that’s obviously not true.
But others say macOS has malware so it’s no better than Windows in that regard, but I don’t think that’s true either.
Look at this example. It only works if it tricks users into downloading and running an unsigned executable, bypassing sometimes multiple warnings.
The thing is that Windows is still more used than osx. So naturally it’s going to be targeted more. Especially since more businesses use Windows than osx too.
I’ve come across Linux malware in my time in cyber Sec. If it exists, it’ll have malware.
That’s true, but macs also do have more security controls, configured more sensibly by default. BitLocker, the system’s full disc encryption feature for example, is still considered a premium product reserved for more expensive editions, whereas macs, android, and iOS have had it standard and default enabled (the latter two with no option to disabled it) in current versions for years. Windows still does not require (or last I checked even offer) things like application sandboxing or runtime hardening by default (this may well have changed in the past couple of years, but I’ve heard nothing of it). While the Universal Windows Platform does have a functional permissions system, that whole platform is (as I understand it) limited to the Microsoft store (which as I understand is ignored by vendors), and the last time I looked at it, it was a mess. There are other such things. Which isn’t to say macs can’t get malware, they can, and they’ll get more malware as time goes on. There are other measures set up on Windows but not macOS, but they don’t appear to be as effective to me, and they seem to be mainly focused on reacting to specific incidents. Security-wise, the two really are not the same.
Drive encryption doesn’t really matter to malware, since the disk must be decrypted to function when turned on. Also the majority of malware still runs in userland, maybe arguably more since the rise of ransomware.
I’m not sure what you mean by permissions being limited to the Microsoft store exactly, but there’s a very robust permissions system built into Windows by default. It’s just not very user friendly, and your average user wouldn’t know it exists probably.
There’s arguments on both sides about default security policies anyway, as I’ve found navigating osx systems to install software can often be a nightmare - but that could be due to my lack of experience with it directly.
Both systems have pros and cons from a security standpoint. In the corporate spaces I’ve worked in, osx security is more annoying to manage from a central point than Windows.
So the argument is security by obscurity works?
In the phrase “security through obscurity”, obscurity means obscuring how the system works, eg making the source code secret. Mac being less popular has nothing to do with security through obscurity. The argument is that a less deployed platform is a less valuable target, which is absolutely true.
I’m not sure how you got that from my comment.