Second, the FUD-mongering: This eWeek article is so chock full of FUD, it makes a cynic smile...
Quote:
"Attackers have been focused on the [Intel] x86 for over a decade. Macintosh will have a lot more exposure than when it was on PowerPC," said Oliver Friedrichs, a senior manager at Symantec Corp. Security Response... There are many more malicious hackers who understand the x86 architecture in-depth... And attackers have access to hundreds of documents and examples of how to exploit common vulnerabilities on x86, whereas exploits for PowerPC are far fewer, Friedrichs said.Analysis:
Norton Antivirus for Macintosh version 10.1 (*NEW* *IMPROVED* *Now with Intel-based Mac support*) was released on 25 Jan 2006. The eWeek article with the above choice quotes was published on 26 Jan 2006. Coincidence? Or, should the first page of the article simply state the following: Symantec manager believes that he can increase revenue by scaring folks into NAV/Mac software licenses and subscriptions with every new Intel-based iMac or MacBookPro that is sold. The article tries to recover and/or regain credibility by quoting a couple of "security researchers," including one that is critical of some OS X coding practices. I am not a virus writer (IANAVW?), but it seems to me that the underlying hardware architecture has almost diddly-squat to do with most of the types of exploits that are seen in the wild today. Heck, most of the payloads manipulate files in the file system -- not exactly the type of thing that requires digging out some rainbow-covered books on Intel processor/chipset internals or your trusty old-school 1980s Intel 8086 assembly programming manual. In fact, I'd bet that you probably don't even need to read this Cross Intel Architecture Development Tool write-up.