To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
On 11/4/07, Kyle Lutze <[EMAIL PROTECTED]> wrote:
>
>
>
> What makes me unhappy is that people are using an SE exploit as a
> way to say here's proof that a mac is as insecure as a windows box
> or gadi saying the itw barrier has been broken for apple (read above
> about requirements for itw status). No computer is 100% secure, but
> with a default setup of windows vs. mac a mac is still more secure.
> if they were to write this trojan for a windows box they wouldn't
> have to worry about requiring superuser authentication on the
> majority of systems as by default your account is an administrator
> account on windows and not many end users change that, or they could
> just take advantage of any of the multitude of vulnerabilities
> available on windows boxes directly connected to the internet to
> install it automatically without even having to attach it as a fake
> video codec to a porn video.
>
>From my personal POV here, I think it best to break this down the the
simplest terms.
If we want to assume that Risk = Threat x Vulnerability, then the issue here
is not Vulnerability. I think everyone here agrees that the "Vulnerability"
being exploited in this situation is the user. However, "Threat" has just
increased. And with this increase in threat, the risk that automated
vulnerabilities will be exploited in the future has now increased.
My point is nothing more then being ignored does not make you more secure.
Bully for Apple that they are no longer ignored.
--
Jim O'Gorman
[EMAIL PROTECTED]
http://www.elwood.net
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets