> Nothing would keep a similar virus from attacking Mac if you run any sort of remote access and a weak password.
It's funny you should mention that because I run a daemon that checks /var/log for suspicious activity. When it finds something that looks like a brute force attack, it blocks the attacker with a firewall rule.
Now this thing is a nice ready made app available through my distro's standard repos. But in the old days, I cobbled the same thing together with a bash script.
If you aren't operating under the assumption that you are helpless and the situation itself is helpless, there's actually a lot of stuff that you can do do slow attackers down.
The idea that "it's all about popularity" is one of the most dangerous bits of self-delusion that the Lemming crowd perpetuate. They make it sound like there's no defense when there are a lot of clear an obvious defenses.
The first one is to not be a total idiot and/or tolerate a crap product.
You simply don't have to be trapped into using crapulence you will later feel the need to make excuses for.