In 2012, the Flashback Trojan has crossed the security border claimed by Apple. It was real challenge to Apple who is claiming “Security by obscurity”. Until then the Apple has claimed that their devices don’t require antivirus as they have inbuilt security system which can take care of any malicious attacks.
Apple took innovative approach to solve the issue. They had released 3 new updates in a week to mitigate the risks from Flashback Trojan. It has helped destroying the threat completely and also introduced a proactive approach to reducing the security risk. Meanwhile, the business opportunity grabbed by other security company as soon as the news broke about the Flashback Trojan, the sale of Mac security software trial version got increased substantially due to this attack. In 2013, it would have been difficult for Apple to make people believe their obscurity theory for security. But they played smart and stick to their claim of security by obscurity. Rather opting for open-source solution or antivirus, they have provided security solution in their software update. In this way, they dealt the problem which they had encountered in 2012 and by proactive approach, they eliminated risks for upcoming security risks and stick with their claim. With enabling firewall, disabling Java in browser, keeping software up-to-date and avoiding opening unknown files the threats can still be avoided in Mac without any additional security software.
According to me it is difficult the remain safe under the shelter of obscurity. In long run, there is a possibility of cyberattacking through the loop hole. It’s just a matter of time until then it’s safe. Just what has happened to Apple in 2012. It can happen with any of the operating systems. But I think I would rather prefer commercial or open-source solutions. The code is tested till the very last element and security weaknesses can be identified and fixed immediately.
Dignan, Larry. (April 06, 2012). Apple’s security code of silence: A big problem. Cnet. Retrieved from https://www.cnet.com/news/apples-security-code-of-silence-a-big-problem/
Mogull, Rich. (April 06, 2012). What you need to know about the Flashback Trojan. Macworld.Retrieved from https://www.macworld.com/article/1166254/what_you_need_to_know_about_the_flashback_trojan.html
Wheelar, Evan. (2011). Security Risk Management: Building an information security risk management program from the ground up. Waltham, Massachusetts: Syngress.