{"id":1480,"date":"2006-05-05T00:00:00","date_gmt":"2006-05-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/05\/mcafee-launches-virusscan-for-mactel\/"},"modified":"2021-12-30T11:39:28","modified_gmt":"2021-12-30T11:39:28","slug":"mcafee-launches-virusscan-for-mactel","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/05\/mcafee-launches-virusscan-for-mactel\/","title":{"rendered":"McAfee Launches VirusScan For Mactel"},"content":{"rendered":"<p>McAfee released a report claiming a huge increase in Apple vulnerabilities, and then followed that up with an anti-virus product for Intel-based Macs.  McAfee Thursday launched an anti-virus product for Intel-based Macs, taking advantage of increased worries about Mac OS X vulnerabilities as Apple Computer migrates machines to Intel&#8217;s processor.  McAfee VirusScan for Mactel 8.0 runs under the Rosetta emulator included with Mac OS X 10.4.4 and later, software that lets programs originally written for the PowerPC processor to execute on the newer Intel-powered iMac, Mac mini, and MacBook Pro models.   VirusScan for Mactel uses McAfee&#8217;s standard virus scanning engine, and the software can be centrally managed in enterprises by McAfee&#8217;s ePolicy Orchestrator 3.5 and 3.6.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;As more companies deploy Mac systems running on the Intel platform in mixed environments, the risk of infection will most likely increase,&#8221; said Eric Winsborrow, McAfee&#8217;s vice president of marketing, in a statement.   To bolster that take, McAfee on Thursday released a report that outlined a 228 percent increase in the number of Macintosh vulnerabilities from 2003 to 2005.  Even so, the number of Mac-targeting viruses since 1987 &#8212; just 76 &#8212; is dwarfed by 160,000+ aimed at Windows during the same period.<\/p>\n<p>Still, McAfee believed the alarm should be sounded.  &#8220;The availability of Mac exploit code on the Internet makes it an open target for the same types of malware currently plaguing the Windows world,&#8221; Winsborrow claimed.<\/p>\n<p>http:\/\/www.informationweek.com\/internet\/showArticle.jhtml;jsessionid=EFSNVFDLZZ4XKQSNDBOCKH0CJUMEKJVN?articleID=187200766<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1480","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1480"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1480\/revisions"}],"predecessor-version":[{"id":3967,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1480\/revisions\/3967"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}