Sophos: Apple users "soft targets" for malware threats

Security vendor hits out Mac users for not taking anti-virus more seriously.

attack

The dismissive attitude of Apple users to computer viruses needs to change, as research from security vendor Sophos shows that 20 per cent of Macs carry Windows malware.

The firm explained that, while Windows malware is unlikely to cause much disruption to Mac users, it can be easily passed on to other computers.

Moreover, Sophos also discovered that approximately 1 in 36 Apple computers contain Mac OS X malware.

Mac users need to be responsible members of the internet community or they're going to continue passing on viruses

Its findings, published at Infosecurity Europe in London today, are the result of an analysis by Sophos of 100,000 Mac computers.

Sophos claimed that some of the Windows malware its research uncovered dated back to 2007 and would have been easily detected, if Apple users were not so laid back in their approach to anti-virus.

Speaking to IT Pro, Graham Cluley, senior technology consultant at Sophos, said the results, along with the discovery of the Mac-focused Flashback malware, should serve as a wake-up call for Apple users.

"For Mac users, the dream is over. They've been living in denial all this time. We've just found 600,000 users infected with Flashback. They are going to have to start running anti-virus," said Cluley.

"Mac users need to be responsible members of the internet community or they're going to continue passing on viruses to other people and contributing to the spam email problem."

He said part of the problem is that many Mac users consider their systems to be impervious to attack from viruses, making them a soft target for hackers and malware authors.

"If you're a bad guy writing malware, you wouldn't write it for computers that are constantly being updated with anti-virus signatures," said Cluley. "Why not write it for the platform where people are more laid-back about things like that?"

Featured Resources

Become a digital service provider

How to transform your business from network core to edge

Download now

Optimal business results with the cloud

Evaluating the best approaches to hybrid cloud adoption

Download now

Virtualisation that enables choices, not compromises

Harness the virtualisation technology that's right for your hybrid infrastructure

Download now

Email security threat report 2020

Four key trends from spear fishing to credentials theft

Download now

Recommended

How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

14 Jan 2021
Mimecast admits hackers accessed users’ Microsoft accounts
Security

Mimecast admits hackers accessed users’ Microsoft accounts

13 Jan 2021
What is public key infrastructure (PKI)?
Security

What is public key infrastructure (PKI)?

12 Jan 2021

Most Popular

How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
The fate of Parler exposes the reality of deregulated social media
Policy & legislation

The fate of Parler exposes the reality of deregulated social media

14 Jan 2021
Should IT departments to call time on WhatsApp?
communications

Should IT departments to call time on WhatsApp?

15 Jan 2021