web analytics

Apple Users – Make Your Time

Via Mashable: Security Exploit Can Give Hackers Control of Your iPhone or iPad [WARNING]

By just loading a PDF file on your iPhone, iPad or iPod Touch, you could be handing over complete access to your device in what could quickly become a major security breach.

As a recent Apple convert, I’m as guilty as the next geek in thinking that by using Apple products I’m immune to the exploits and hacks that seem synonymous with Windows. I work each day knee deep in Microsoft and I see more than my share of trojans, viruses and spyware. Despite our best efforts, we’re cleaning this crud off of our computers multiple times each week.

When I acquired my first Apple computer (the iMac) in June of 2009 I was giddy as a school girl, not only at the prospect of having new technology, but also in having something I was sure would be free of the pitfalls of the average Microsoft system.

To this day I don’t run anti-virus or security software on my iMac because I know that it is just not as vulnerable as the Windows computers I deal with every day.

But in my heart of hearts, I know that is changing. The Mashable story above is a testament to this fact.

Apple computers and other devices like the iPhone and the iPad are becoming less and less of a novelty and more the mainstream each and every day. Long time hold outs for Microsoft like myself have switched to Apple. And more are adopting every day. Add to the mix the growing number of Blackberry and Windows Mobile users who are ditching these devices in favor of the the iPhone to connect to corporate resources and it’s not hard to imagine that the hackers and sploiters will have no choice but to turn their dark skills to this platform with greater and greater zeal.

I have long recognized that Apple products are not immune to being exploited because they are flawless and so very secure. They have simply enjoyed what is commonly referred to as “security through obscurity.” Hunting hackers in the Windows world enjoyed a target rich environment where identities and banking info was theirs for the taking.

To Apple’s credit, they seem to be very responsive when vulnerabilities in their platform are identified. This is in stark contrast to Microsoft who seem slow to acknowledge and address security issues in a timely fashion.

Every time I see a story like the one above it reminds me that “vigilance” is still the watchword. One simply cannot assume they are invulnerable just because they use one particular product. Digital predators are everywhere and as Apple becomes a juicier target, there’s no reason to suspect the hackers won’t want to add their own “bite” to the popular product logo, metaphorically speaking.

I for one and going to install anti-virus software immediately and keep an eye on sites like Mashable/Apple and Cult Of Mac to make sure I stay informed.


Jay Lee is the co-creator and host of Technology Bytes Radio. Lee is also author of Helpline for the Houston Chronicle.

  1. Dead on. Apple products aren’t immune to security flaws, both in Apple code and in underlying third-party utilities they’re built on. No coder is perfect and no process finds everything, and even where it’s secure, there are plenty of exploits that are socially engineered to get the user to do something unsafe that seems safe.

    It’s always been a concern that increasing popularity of the OS could lead to popularity of it for malware authors.

    So, yeah, not getting attacked 24/7 is good, but there’s no reason to think you can’t get attacked.

  2. Hey man, you should download ClamXav.app , run an antivirus chock on you mac every now and then, i run it every 6 months or so…..mostly when i download mac software from “unknown anonymous sources”…

  3. Great post Jay. Apple’s success means that the cyberscum have another effective attack vector. They WILL create successful attacks. Protect yourselves!

  4. That is known that money can make us independent. But how to act if somebody doesn’t have cash? The one way is to try to get the business loans or just secured loan.