Source: https://www.globalsecuritymag.fr/IMG/pdf/Year_in_Mac_Security_2009.pdf