Skip to Content
3-01-2010 @ 4:14AM
Honestly, with computer security where it's at, phishing schemes are almost universally simpler than actually trying to break into a machine.Macs do have a few security advantages over windows, but all it takes is a bit of stupidity or a flash exploit (thanks again Adobe) and the party's over.Macs actually make up a significant portion of the personal computer market, particularly among younger people (~45% of the connections to my University's wireless network come from Macs, and ~40% come from PCs). They don't play too much a role in the business world, though, so they aren't as profitable to design hacking techniques for.
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.