This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
When Malware Attacks (Anything but Windows)
May/June 2008 (vol. 6 no. 3)
pp. 68-70
Adam J. O'Donnell, Cloudmark
Where is all the Macintosh malware? Learn about a new model based on game theory for predicting if, and when, Mac malware will arise based on a reasonable number of measurable parameters.

1. A. Kingsley-Hughes, "F-Secure: More than 100–150 Malware Variants Targeting Macs," http://blogs.zdnet.com/hardware?p=1021.
2. A. Clementi, "Anti-Virus Comparative No. 17: On-Demand Detection of Malicious Software," AV-Comparatives.org, Feb. 2008; www.av-comparatives.org/seiten/ergebnisse report16.pdf.
3. A. Clementi, "Anti-Virus Comparative No. 16: Proactive/retrospective test," AV-Comparatives.org, Nov. 2007; www.av-comparatives.org/seiten/ergebnisse report16.pdf.

Index Terms:
malware, game theory, Attack Trends, Macintosh, Mac
Citation:
Adam J. O'Donnell, "When Malware Attacks (Anything but Windows)," IEEE Security & Privacy, vol. 6, no. 3, pp. 68-70, May-June 2008, doi:10.1109/MSP.2008.78
Usage of this product signifies your acceptance of the Terms of Use.