![]() ![]() It marked the company’s transition to Intel processors, which replaced the Po werPC chips used in previous devices. In 2006, Apple released its first MacBook powered by Mac OS X 10.4 (Tiger) and an Intel Core Duo processor with up to 2.0 GHz. The rise of MacBook and subsequent Mac malware In addition, it would send the malicious image files to all the victim’s iChat contacts. Disguised as an image file, it installed itself on the system and infected Cocoa apps, such as Safari, iCal, Terminal, preventing them from running. Two years later, Leap-A, also called Oompa-Loompa, started spreading via iChat. In 2004, the Trojan Opener /Renepo was used to locate and crack passwords stored on the hard drive. However, it didn’t take long for the first Mac malware to appear. Second, most malware developed in the early 2000s was compiled in x86 code, which was not able to run on Mac OS X devices, and was targeting Windows, the dominant operating system. First, many new built-in security features were leveraging the UNIX core. ![]() A clear departure from the classic MacOS, OS X 10.0 was resistant to malware. MacOS X 10.0 powered the third generation of iMacs and it was the first operating system to use Darwin, Apple’s Unix-like OS based on a hybrid kernel called XNU. The modern history of MacOS began in 2001, when MacOS X 10.0 was announced. ![]() Opener and the first generation of Mac malware threats How e ver, t he myth about Mac’s built-in immunity to malware started to be challenged in the past years and has been shattered when Pirrit and Silver Sparrow Mac malware made their way to the latest generation of Macs powered by the company’s native M1 chip. While W indows PCs and laptops combine hardware from hundreds of manufacturers, without Microsoft having direct control over production process, Apple computers have been traditionally considered much safer than Windows. Apple strictly monitors the hardware production for its devices and sets tight restrictions on app developers. The Mac ecosystem has a reputation for being safe and secure by default, due to Apple’s strict control over its hardware and software. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |