+++ to secure your transactions use the Bitcoin Mixer Service +++

 

Subscribe!
News and Analysis
Plus Main Dvorak
Dvorak 8/24
The Top 100 Websites of 2009
Best Free Software
Utility Guide Module
Product Guides
top sellers

Apple Confirms Anti-Malware Added to 'Snow Leopard'

Apple review, Apple commentary, Apple news... Everything Apple

On Wednesday, it was discovered that the latest version of Apple's OS X has clear built-in malware protection. Apple has since confirmed the addition.

One of Apple's stronger selling points has been its computers' seeming imperviousness to such threats. This is not the first time Apple has acknowledged the existence of malware, of course, but it may be the clearest example of such an acknowledgment.

Apple first introduced a feature called File Quarantine back in the days of OS X 10.4 Tiger. The same technology was also built into the next iteration of the software, OS X 10.5 Leopard. Apple is offering an "enhanced" version of the feature with this latest version, OS X 10.6, or "Snow Leopard," Apple confirmed.

Now File Quarantine pops up an alert the first time a potential piece of malware has been detected in Safari, iChat, or Mail.

"In these cases, rather than just advising the user that the file is an application, Snow Leopard provides a warning that the file contains known malware and suggests that the user move it to the Trash," Apple said. "For example, a bogus version of iWork circulated on the web a few months ago that contained malware. That particular malware is now automatically detected by File Quarantine. We see this as simply another example of the refinements users will find in Snow Leopard."

Apple creates the file signatures used by File Quarantine, and will be constantly updating signatures on its end, the company said.

For a full review of Apple's OS X 10.6 Snow Leopard, go to PCMag.com.

Additional reporting by Sean Carroll.

Originally posted to AppScout.
2
Comments
Add Your Comment
Report
mathion

August 27, 2009 17:11:18 GMT

And that smug Mac guy was just telling a PC girl how Apple was safe from that kind of thing when she said she wanted a computer where she didn't have to worry about viruses and spyware and all of that.
It appears that the smugness about Apple's security, in light of the many recent glaring security vulnerabilities, is wearing thin...

Report
TSR2

August 28, 2009 09:37:01 GMT

And nowadays the weakest link is usually the user. The stereotypical Mac user is far less aware of the existence of malware for Macs, and so is far more likely to fall victim to social engineering.

Add Your Comment

( maximum 2000 Characters )


newsletters

Get PCMag.com's FREE email newsletters delivered to your inbox.

It's easy, just follow the steps.

Want more? Check out our other newsletters here.

Manage your newsletter subscriptions here.

1. Make your selections:

Daily News Alert
PCMag.com Small Business Update
PCMagCast Update
Productwire: First Looks Update
Security Watch
TechSaver
Utility Library Update
What's New Now
PCMag Announcements

2. Select email format:

3. Enter email address:

NoteWhen 3: Clear the Clutter. Version 3




NoteWhen 3: Clear the Clutter. Version 3 adds many features that you, our subscribers, have been asking for. You can now:

Send notes by e-mail, including Gmail or secure servers
Synchronize notes with notes from other machines
Lock notes to prevent further editing
Archive notes, taking them out of the list without deleting them
View scheduled events on a bigger calendar showing note titles
Make NoteWhen portable for flash drives
Export notes to HTML, RTF, Text, or CSV
Print a list of notes

Download Now: NoteWhen3Setup.zip
PCMagCast
PCMag.com's live, online events make you more productive at work, home, and on the go. Best of all, they're FREE!

Featured Event:

Lower Your Costs and Improve Your Security with Network Consolidation
View on Demand!
Sponsored by SonicWALL

With the ever-increasing pressure of budget reductions and the ongoing need to do more with less, IT is looking at the long term costs of owning solutions. Optimizing resources, driving efficiency and lowering total cost of ownership are critical strategies for the survival of any business. Security Consolidation does just this. View now!

See all PCMagCasts >>
 
Free Learning Center:

Centralize! Deploying Your First Small Business Server


Available on Demand - Sponsored by Dell SB360
Now, more than ever, your business can reap big benefits from centralizing on a server-based network. And, with the recently introduction of Small Business Server 2008 operating system from Microsoft you can automate key network tasks more efficiently.

Register now.