Within one week, hackers have demonstrated three methods to compromise OS X's security in ways that were increasingly sophisticated.
The first OS X worm relied mostly on social engineering. To the extent that many argued that is was a Trojan rather than a virus.
The second one used a vulnerability that had been patched more than six months ago. So what's the real risk, Apple supporters countered? Never mind that most Windows worms rely on patched security flaws.
Today we have an unpatched vulnerability that compromises a system's security without any user interaction. Visiting a website or viewing an email will do enough to get infected.
So what will the excuse be this time? The fact that there is no exploit code found in the wild? Or the fact that the proof of concept code fails to demonstrate any self-spreading capabilities?
We merely have to wait for the spam, ID theft and adware guild to develop some decent spyware, adware or botnet software so they can monetize the OS X platform. If there's money to be made, criminals will exploit whatever operating system they can.
Double legal trouble for Musk as he also faces civil lawsuit over renewed British pot-holer 'paedo' claims
Battery development could help boost performance of smartphones
Topological photonic chips promise a more robust option for scalable quantum computers
In quantum physics both the chicken and the egg can come first, claim University of Queensland researchers
Cause-and-effect is not always straightforward in quantum physics