Friday, February 25, 2011

Apple and Viruses. Guest Post by Spring Intern - Michael Senatore


Intern:  Michael Senatore
Topic:  Apple and Viruses
Internship Outline #1
Version 1.0
Date:  25 February 2011

TEASER / TITLE
For years, Apple products have had one up on the PC regarding viruses and malware.  However, due to increased market share, that time may be coming to an end. 

SUMMARY PARAGRAPH
Throughout the history of Apple products there has been a long standing consumer myth that they are incapable of becoming infected with viruses.  Most believe that the Mac Operating System was simply more secure than that of PC.  Although the system may be more secure, it is still vulnerable to malware and other infections.  One needs to look no further than the fact that Apple sells anti-virus software from many of the leading names in the virus protection industry.  What really gave Apple its edge was their lack of market penetration, a result of occupying a small portion of the computer sales industry.  Simply put, if you want to catch a fish, you go to the pond with the most fish.  That “pond” has always been PC’s.  However, along with their growing popularity and rise in market share, Apple products are becoming more vulnerable to viruses and other harmful infections.

BACKGROUND
The myth that Apple products are impervious to viruses is almost like a virus in and of itself.  Only instead of infecting Apple products, it is infecting the way Apple users think about the product.  This “myth” continues to mislead Apple users into believing they are safe from viruses and there is no need for anti-virus programming.  Unfortunately, life would just be too simple if this was the case. From reading forums and discussing the topic with owners of Apple products, it is blatantly obvious that Apple users are completely unaware of the harm to which they are exposing their computers.
            Currently there are several types of viruses that can potentially harm Apple products.  One of the main areas of concern is downloading files that are infected with Trojan horses, spyware, and worms.  These types of files can be found on pirated software and games.  Versions of Microsoft Office infected with viruses can also infect Mac products using the program.  Also, browser plug-ins for viewing video content can harbor malware, making your Mac more vulnerable to other infections.  These problems are really just the beginning because they do not take into account the growth and success of Apple and their products. 

STRATEGIC PLANNING ASSUMPTIONS
-Apple, the company, must do a better job of informing their customers of the risk to their computers.  What was once a selling point, needs to now be addressed as a concern.
-Apple users need to become more educated.  They need to open their eyes to the problem and take appropriate action.
-Acquire an anti-virus program.  Many of the major anti-virus companies, such as McAfee, Intego, Norton and Symantec have all released programs for Apple products. 

ANALYSIS
The main reason for the recent increase in viruses infecting Apple products goes hand in hand with the success of the company.  In just the past two years, Apple has consumed nearly 3% of the entire computer sales in the United States, raising their overall market share to 10.4%.  Although that may not sound like a large increase, Apple’s annual growth is nearly off the charts.  Over those same two years, Apple’s year to year growth has been 24.1%, which dwarfs the overall industry’s growth of 3.8%.  With the wild popularity of the iPad, iPhone and other Apple products, this percentage will only continue to grow.
            In any business venture, success has its drawbacks, and this same theory can be applied to Apple and their current surge in the United States computer sales industry.  As stated previously, the idea that Apple products were incapable of being infected with viruses was a selling point.  Many businesses opted to use Apple computers for their convenience and savings that go along with not having to worry about viruses or spend more money on anti-virus programming.  While Apple products once enjoyed the safety of their own anonymity, they must now accept what comes along with their new found popularity. 

IMPLICATIONS
-The “myth” of Apple products not being able to contract viruses is simply not true.
-Apple has become a mainstay of the computer industry, holding a market share of nearly 11%, a figure which continues to rise.  As a result of the increased penetration, the most secure days of the Mac OS are in the past.
-The vulnerability of Apple products goes hand in hand with the success of the company, which is growing at a rate nearly eight times that of the rest of the computer industry.
-While the sales figures of HP and Dell have plateaued, Apple continues to grow at an annual growth rate of 24.1%.
-Apple currently holds the number four ranking in the computer sales industry, behind HP, Dell, and Acer.  Following market trends, by this time next year, Apple will be well ahead of Acer and catching up to HP and Dell. 
-Due to the wild success of the iPad, iPhone and the Mac OS, there are no signs of Apple’s growth slowing down.

KEY FINDINGS
-The majority of Apple users are completely unaware of the susceptibility of their computers when it comes to malware.  Stay informed with updates from Apple and other security upgrades.
-The easiest way to prevent computers from being infected with viruses is to stop them before they start.  We all know how difficult computers can be to work with when they are infected with any type of virus. 
-Nearly all the major anti-virus companies now sell programs for Apple products.  (A sign of things to come?)

RECOMMENDATIONS
-Verify that your computer is protected by an anti-virus program.  There are some free anti-virus programs available, such as iAntiVirus and ClamXav, however they are not considered as robust as the major companies such as McAfee, Intego, Norton and Symantec.
-Use common sense when surfing the web.  Do not visit websites that are not known to be secure and do not download files or documents from an unknown sender.  Also make sure your virus scanner and security updates are frequently updated with the newest protection.
-Stay ahead of the curve by educating yourself with the current viruses and other problems infecting computers. 
-Happy surfing!


SOURCES
“Do Apple Computers Need Virus Protection”.  Robin Noelle.  eHow.com.  April 1, 2010.
“Apple’s Share of Computer Sales Surpasses 10% in the U.S.”.  Eric Slivka.  Macrumors.com.  October 13, 2010.
“Hey Apple, About This Virus Thing”.  Steven Hodson.  WinExtra.com.  April 27, 2010.
“Antivirus Software On Your Mac:  Yes or No?”.  David Greenbaum.  Gigaom.com.  February 4, 2011.  

Friday, January 28, 2011

Egypt Protests and Social Networking Site Access Impacted

Scanning Twitter feeds this week, I saw several posts that talked about what was going on Egypt with the caveat that they were posting for someone in Egypt.  This is because the government of Egypt allegedy blocked Facebook and Twitter after a series of anti-government protests.  Facebook was aware of disruptions in service but said it did not experience a major change in traffic.

In the CNET News article the had a quote from Jim Cowie from the internet monitoring firm, Renesys:  "at approximately 2:34pm PST, his company 'observed the virtually simultaneous withdrawal of all routes to Egyptian networks in the internet's global routing table'.  "

@Scobleizer posted:  Egypt "Let's turn off the one thing keeping young people inside so they will stop protesting." Um, yeah, that really will work.

Secretary of State Hillary Clinton called on Egypt to unblock social networking sites, she asked them "not to prevent peaceful protests or block communications, including on social media".

Sources:
"US Tells Egypt to unblock Facebook, Twitter", TodayOnline, January 28, 2011.

"Twitter Reacts To Protests In Egypt", Liz McLellan, Huffington Post, January 28, 2011.

"Egypt internet outages hit Facebook and Twitter", Elinor Mills, CNET News, January 28, 2011.

Expanding Internet Access in the U.S.

"Within the next five years, we will make it possible for business to deploy the next generation of high-speed wireless coverage to 98% of all Americans."

Could interconnecting rural areas via an internet highway fuel existing economies and create new business models?  It could be part of the equation but just adding internet access is not the final solution.

At a minimum, to make this happen, we will probably need to:
1.  To encourage the television industry to give up some of their bandwidth to make it available for wireless.

2.  Provide incentives, read your tax dollars, would need to be teed up to encourage firms to lay more cable for landline access to the internet.

3.  Update the policies and inventory of the airwaves, who gets to use them, and what they get used for.

4.  Discuss policy questions such as:  If the Government drives the build out, does that mean they control and manage the newly built internet access?

Sources:
State of the Union Speech, President Obama, January 25, 2011.

"Obama Aims to Boost Infrastructure Spending", Josh Mitchell, Wall Street Journal, January 26, 2011.

"Obama Pushes Expanding High - Speed Wireless Service", Reuters, New York Times, January 26, 2011.

Do you use the Facebook "Like" Button? You Might Become Part of an Ad.

Many of us use the "like" button on our friend's posts and even when visiting company sites.

If you click on a "like" button for a store or brand, Facebook plans to incorporate your "like" into generating a "Sponsored Story" for advertisers that want to pay for it.

Once you "like" something, Facebook does not offer a way for you to opt out of your "like" being featured in an ad.

The one limit is does have is if you have set your privacy settings for your posts and limit who can see them, when the company buys a sponsored ad, only the people you authorized to see that original post can see it.




Sources:
"Facebook to let advertisers republish user posts", Barbara Ortutay, Associated Press, January 26, 2011.

Did Someone Hack Into Microsoft to Release Earnings Early?

Brian Caulfield found that a company called Selerity got Microsoft's earnings early, before they were officially announced.  But they did not hack their way in or steal them, they just guess the name of webpage, or URL, that had the earnings posted on them.

There is a fairly common practice to create web pages that are published and live, just not yet linked to main pages.  The pages exist, you just have to know how to find them.

The Selerity company actually searches for earnings releases using technology to try to guess the earnings webpage name.

Selerity reported Microsoft's earnings at 2:50 EST.  Microsoft usually reports them at the close of the stock market.


Sources:
"How Selerity Got Microsoft’s Earnings Early", Brian Caulfield, Shiny Objects on Blogs.Forbes.com, January 27, 2011.

If it sounds too good to be true, it probably is

Emails from McDonald's are making the rounds and it's very exciting.  Take a McDonald's survey and get $250 for participating.  The problem is, the email is not legitimate.  It was generated by cybercreeps who want to steal your information.

How it works:
1.  Take a 5 question survey
2.  To "win" your $250, provide your personal information AND your credit card so they will "credit" your account (warning!  warning!)

Tips to spot and avoid scams:
1.  Most surveys, if they offer everyone something, usually give you a nominal amount on a gift card or coupons for a free item
2.  If a company asks for your personal information along with credit card or bank account to "give" you money, it's most likely a scam
3.  Pay attention to the language used - does it sound like the company?  In this case, the message mentions that you are taking a "public opinion poll conducted by McDonald's, a non-partisan polling organization."  I appreciate the fact that the Golden Arches feels food should transcend political parties but that statement does not make sense.

Many thanks to Tony Bradley for highlighting this phishing scam!

Sources:

"McDonald's Phishing Scam: I'm Not Lovin' It", Tony Bradley, PCWorld, January 21, 2011.

Do You Ever Get The Feeling Like Somebody Is Watching You?

Do you think that R&B singers, Rockwell, Michael and Jermaine Jackson could have predicted that Geico commercials and today's surveillance age would make their song, "Somebody's Watching Me" such a popular ditty well after it's release in 1984?

If you went to the airport, bank, or a store today, you probably expected to be watched and maybe even tracked, while on premises.

But those are the old school ways of being watched.  Now, the smartphone in your pocket could watch you or your laptop webcam can watch you.

Having an emotional reaction?  There's a wristband monitor for that.

Have a lot of old photos that you need to categorize?  Google and Picassa offer a helpful feature, photo tagging, where they auto suggest who your friends might be and potential names of people in photos based on previously tagged photos.  Helpful?  Yes, and a little spooky too.

At the Consumer Electronics Show, Microsoft and Intel showed attendees an in-store digital billboard that memorizes faces.  The memorization helps track products you like.  That is quite a step up from my grocery store loyalty program.

What happens when technology advances fuse the photos your friends tagged you in, with the grocery store digital billboard, and other information?

All of this data collection can be helpful and put to very good use.  Monitors can alert law enforcement of a potential bad guy's whereabouts.  Monitors could help avert a major health issue for example.

However, there are concerns about privacy:
1.  Who is allowed to collect data via sensors?
2.  Should they have permission first or do they need to disclose that sensors are in use?
3.  Are they allowed to bundle that with other information to create individual profiles?
4.  If you are tagged in a photo by a friend, who else can use that tag?  Is that available for searching by anyone that takes a photo of you and wants to profile and track you?
5.  Employers use Facebook and other online searches now to look up candidates - this will transform information available about you


Sources:
"Hello, Big Brother: Digital sensors are watching us", USA Today, January 27, 2011.