[citation][nom]ap3x[/nom]Apple's current market share is 12.9%. They are in third place behind HP and Dell. That is not as small as you guys are making it out to be. There are currently 0 self propagating viruses for OSX and very few viruses in general. Some of which are your basic macro viruses. 12.9% market share does represent a reasonable target if the OS is "wide open" as you guys like to say. The truth is that OSX is more vulnerable than Windows under certain conditions and less vulnerable than Windows in others. OSX has issues with their authentication mechanisms for network enabled applications. BAD STUFF but can be in a large part remedied with the use of a firewall to control what ip can access what services or turning on stealth mode which is built into the OS.Windows has more problems with Application layer vulnerabilities. They have done a good job shoring up allot of the network related vulnerabilities. It used to be easy to find a network services and do a buffer overflow attack to gain access via a system account, then create a real user from the command line with the appropriate (or inappropriate) privileges. Now it is harder to do. Now you are seeing more localized exploits in Windows to compromise the system and then open it up from there. This two can be remedied through the use of the appropriate security measures.Apple's current market share is 12.9%. They are in third place behind HP and Dell. That is not as small as you guys are making it out to be. There are currently 0 self-propagating viruses for OSX and very few viruses in general. Some of which are your basic macro viruses. 12.9% market share does represent a reasonable target if the OS is "wide open" as you guys like to say. The truth is that OSX is more vulnerable than Windows under certain conditions and less vulnerable than Windows in others. OSX has issues with their authentication mechanisms for network enabled applications. BAD STUFF but can be in a large part remedied with the use of a firewall to control what ip can access what services or turning on stealth mode which is built into the OS.Windows has more problems with Application layer vulnerabilities. They have done a good job shoring up allot of the network related vulnerabilities. It used to be easy to find a network services and do a buffer overflow attack to gain access via a system account, then create a real user from the command line with the appropriate (or inappropriate) privileges. Now it is harder to do. Now you are seeing more localized exploits in Windows to compromise the system and then open it up from there. Things like browser vulnerabilities, file format vulnerabilities, malware, keyloggers, email viruses, etc…. They are more inside-out in nature. This two can be remedied through the use of the appropriate security applications as well. Bottom line is that most hackers, script kiddies, and pentesters tend to look for low hanging fruit. They do their reconnaissance, identify a target, use an exploit, gain access, dump tools, escalate privileges, and look for ways to get deeper or just misuse the resources of the comprised machine. This is 90% of the guys out there. They will move onto an easier target if they have to spend a ton of time on anything. The elite 10% rarely actively find and write exploits on the fly during an attack. The reason why is because of SEIM solutions and Heuristic/Signature based IPS/IDS solutions out there will detect abnormal behavior and alert to it. A proper SEIM solution especially. They will normally pre-develop exploits for use in low and slow type of attacks because IPS/IDS's won't detect that allot of times. SEIM's can but only one or two vendors are good at it. Typically these systems are not workstations on a home network. They are resources on a target that have some value. Workstations tend to get attacked with more localized typed of attacks. Things like browser expoitsWindows and Linux servers are used most of the time on the Web and vary in their configuration. Allot of companies don’t actually harden their servers. Few have robust compensating controls to adequately protect them. Allot of times they will not invest in a robust security infrastructure until they have an incident which is sad but those controls are expensive so they prioritize other projects ahead of security.With user PC’s however it is a little different. Most people have a network based firewall and unfortunately allot of these devices are just ACL’s and actually don’t do stateful inspection or deep packet inspection. Where it gets nasty is these so called DMZ modes or game modes on personal firewalls. Basically just leaves the system wide open to all kinds of network based attacks. MS has done a good job shoring up issues with that in a large part due to the amount of activity there. Since OSX is not much of a gaming OS and most people are not hosting network services from OSX it is not as much of a problem. Enable your firewalls guys, use best practices for security on either OS and don’t install everything damn thing you see on the web and you will be fine. The reality is that as of today, most of the attacks are designed for Windows machines as they are indeed low hanging fruit with a variety of versions still in use in a variety of configurations some with and some without the appropriate security measures. As such, most of the attacks we hear about are the more “localized” attacks I spoke of before because Microsoft has shored up allot of the network based stuff along with almost everyone having a network based firewall at home. OSX is not as susceptible to application based attacks but is to network based attacks against network services. It is essentially the reverse of Windows. Is it impossible to attack either one on their stronger sides, by all means no. They just are less or more susceptible depending on the attack vector. There are some area Windows is stronger in and some that OSX is stronger in. There are products for each that shore up the known vulnerabilities for the most part but being that OSX has historically been less of a target and security applications are already developed to secure it means that you will be in good shape if you choose that direction. Windows 7 is fantastic in comparison to other Windows platforms but overall is really about even to OSX. It does however have many more applications available to secure it but that is because of the activity out there against the platform.[/citation]
You're stating market shares that only include OEM sellers, all those that assembled their own computer and bought a license aren't included. The real Mac OS market share is around 8% while windows has almost 90%.