AV-Comparatives reports that Macs are being attacked more and more by cybercriminals taking advantage of Mac users’ typical complacency towards malware threats—most Mac users not bothering with any additional protection against viruses on their computers.
Kaspersky Lab Expert Costin Raiu reports that deactivating the Java browser plug-in and Java Web Start—effectively disabling Java applets in browsers—is even more advisable given confirmation of yet another Mac malware species in the wild. Called Backdoor.OSX.SabPub.a, the malware is like the now infamous Flashback Trojan, being spread through Java exploits.
Keeping on top of latest developments in the Flashback Trojan horse Mac OS X malware saga, both Apple and third party developer Norton have released Flashback removal utilities—in Apple’s case with yet more Java security updates for Lion and Snow Leopard.
The iTwin is a strange-looking device; combined, it appears to be a male-to-male USB stick, but what you’re really looking at is two halves of a hardware/software key that provides secure file sharing between two Internet-connected computers, anywhere in the world.
Less than eight hours (time stamped 9:24 pm last night) after Apple released Security Update 2011-03 for Mac OS X Snow Leopard to deal with MACDefender and related malware, the developers behind the apps created a new variation that is able to slip paste Apple’s updated security. To avoid having your Mac infected, use caution when downloading suspicious software.
Apple’s fix for the MACDefender and related malware is finally live in the form of a software update for Mac OS X Snow Leopard, dubbed Security Update 2011-03. According to the company, the update, weighing in at 2.36 MB, checks for the malware on your system and notifies the user, quits it, deletes any related files, and corrects any modification it makes should it find it.
The SecureMac team has detected another Horse Horder in the wild for the Mac. Like previous findings from this team, this Trojan Horse attempts to disguise itself on your system and then affect it negatively in some way. In the case of the BlackHole RAT 2.0, it slows down your system by tying up the CPU, executes shell commands, and attempts to erase the hard drive. In short, it’s something you don’t want.
Remember the Boonana trojan horse that was in the wild for Mac OS X last month? A variant—the trojan.osx.boonana.b—has now been discovered that acts in much the same way as the original malware. SecureMac has been able to identify two+ websites that are hosting this trojan via update code for the malware. This is a little different from the original trojan which tricked users into running and installing the malware themselves.
“Is this you in this video?” is an all too common question we can find on social networks nowadays. However, new data from SecureMac says that when you see this and a link to a video, it’s highly likely that it’s a virus. This trojan is commonly spread through this kind of message on social networking sites, and is capable of affecting many versions of Mac OS X, including Snow Leopard.
In a press memo, Mac security specialist Intego announced the discovery of a spyware application connected by a few freely available Mac OS X applications. This application is apparently capable of activities from “scanning files to recording user activity, as well as sending information about this activity to remote servers and opening a backdoor on infected Macs.” Labeled as high risk, this malware has been existent in a different form on Windows since 2008 and is usually installed via misleading text about a “market research” program.