Just reading the securityfocus.com article - it's a bit scary. People are paying up to 20,000 USD for OSX exploits? Why? Who? In fact, why are TippingPoint - the company who paid the 10,000 bounty for this one - offering so much? What do they gain?
Just publicity? Or do they hope to make money directly from the exploit?
Look, I (cover your ears, kiddies)
swear I'm not usually a conspiracy nut, but I am almost certain the virus protection software companies directly or indirectly fund much of the virus development work. Like they say, follow the money...
Think about it. Obviously, they have the most to gain. The money you could make on selling time on legions of zombie computers is
peanuts compared to what those corporations are pulling in.
And why has the Mac been so free from infection? If viruses were written by hackers looking to make themselves feel important or win bragging rights, they would have been all over the Mac for years. There would be at least some wild viruses, roughly in proportion to Mac market share. But they haven't been.
A company, though, would do a careful market analysis and determine that they want their 100K/yr security researcher working on stuff that will impact 97% of consumers rather than the other 3%. Let's keep those people scared so they keep their subscription up to date!
Mac market has been growing though... 6% looks better 3%. I think the companies will feel it's worth the effort at around 10%.
Now Windows has "tens of thousands" of viruses, but there are a much smaller number of "root" viruses. An exploit, with code, will be posted somewhere and then "script kiddies" will copy it or combine it with another virus, etc. and try to distribute it. But where did the original posts come from in the first place? From a trained, working professional, perhaps?
And why do security researchers spend so much time hacking things rather than fixing them?