Project Summary: Find a recent digital forensics case where a Macintosh system was either compromised or was the origin of an attack. What was the primary method used for the breach/attack (such as brute force, unpatched system, etc)? What steps could have prevented the breach/attack? With all of the resources and information available regarding Macintosh attacks, how/why are these attacks still occurring and still successful? As Macintosh attacks are less frequently publicized you may apply this to Unix attack or an Apple product attack if it is difficult to identify current, quality resources.