Nja om man läser på:
http://isc.sans.org/diary.php?storyid=1138&rss
så står det:
"The problem is due to a feature that is activated by default: Open Safe Files after downloading. A zip file is considered safe and so they will be opened automatically. Subsequently, a shell script with no #! at the beginning of the script will be executed automatically. NO USER INTERACTION!!
Eftersom Safari behandlar zip-filer som säkra filer så öppnas dessa automatiskt, luckan gör att när detta sker så kan man smita in elak kod som kan köras på den attackade datorn.
Om jag inte missuppfattat det?
// Mendezzz