website statistics

Your Gadget shopping list for Holiday?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)

For long, Apple has held to a notion that somehow, PCs are very susceptible to hacks and viruses whereas Mac is nearly fully secure and that Mac users need not be troubled regarding the security of their machines. However, this seems to be changing now. Apple has taken a clear departure from this former strategy and now seems to be admitting that Mac malware also exist and are a significant threat.

This is quite manifest in the new description that Apple has furnished at its ‘Why You’ll love a Mac’ web page. The older description read:

It doesn’t get PC viruses.

A Mac isn’t susceptible to the thousands of viruses plaguing Windows-based computers. That’s thanks to built-in defenses in Mac OS X that keep you safe, without any work on your part.

Safeguard your data. By doing nothing.

With virtually no effort on your part, OS X defends against viruses and other malicious applications, or malware. For example, it thwarts hackers through a technique called “sandboxing” — restricting what actions programs can perform on your Mac, what files they can access, and what other programs they can launch.”

However, it seems that with increasingly greater knowledge of security online as well as to the users, Apple has realized that it can no longer pitch OS X as a fool-proof software and must admit that Mac OS users also need to be constantly vigilant when it comes to the security of their machines. The new description from Apple reads:

It’s built to be safe.

Built-in defenses in OS X keep you safe from unknowingly downloading malicious software on your Mac.

Safety. Built right in.

OS X is designed with powerful, advanced technologies that work hard to keep your Mac safe. For example, it thwarts hackers through a technique called “sandboxing” — restricting what actions programs can perform on your Mac, what files they can access, and what other programs they can launch.”

Source: Apple

Courtesy: Giga Om

Buy Cheapest Related Product From

Removing Special iPad App, Apple Snatching Disabled People’s Voice

Use Your iPad Without Touching It, With Augmented Reality Gloves
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 15, 2012(3 years, 5 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook