Apple’s chief software officer said that there is now an unacceptable amount of malware targeting the Mac operating system, with the situation now much worse than on iOS.
Craig Federighi, senior vice president of software engineering, made the comments Wednesday as part of his testimony in the Epic Games v Apple lawsuit, according to CNBC.
The case concerns a dispute over Apple’s App Store policies on iOS, with Epic calling for the availability of alternative platforms on the operating system. This would give app developers the ability to bypass Apple’s 30% sales tax on large developers, which Apple claims would undermine the security of the system.
In an effort to dismiss this suggestion, Federighi pointed to the macOS ecosystem, which allows users to install software from a variety of sources but is now “regularly exploited.”
“For iOS, we aspired to create something much more secure,” Federighi said, according to CNBC. “Everything indicates that we have succeeded in doing so. “
Federighi claimed that Apple found and removed around 130 different types of malware on the Mac last year, which infected hundreds of thousands of systems. In comparison, he suggested that there were only three types of malware found to infect iPhones in 2020.
NETSCOUT Threat Intelligence Report
Cybercrime: exploiting a pandemic
He also revealed that members of his own family had discovered malware on their Macs, but stressed that it could still be “used safely”.
“I think the Mac is the car, you can take it off-road if you want, you can drive anywhere you want,” Federighi said. “As it comes as a driver, you have to be trained, there is a certain level of responsibility in doing that. But that’s what you wanted to buy, you wanted to buy a car.”
“With iOS, you can create something where kids, even infants, can safely use an iOS device. Truly different products.”
The Ultimate Guide to Going Mobile for Fire / Emergency Medical Services
Get Your Free Guide to Going Mobile for Fire Services and EMS
VMware Cloud Workload Migration Tools
Types, phases and strategies of cloud migration
Eight Steps to Fighting Ransomware
An overview of how you can protect yourself against this ever-growing threat
IDC: The Business Value of Avi Vantage
A study of companies using next-generation application delivery