tag
Apple

Scam tipo You Tube

Los ataques de scam, así como los de phishing, utilizan la ingeniería social para engañar a la víctima, y lograr así que esta descargue una aplicación maliciosa, brinde sus credenciales de su cuenta bancaria o lo que el atacante desee. Debido a esto, los ataques que utilizan Ingeniería Social son muy peligros debido a que

Apple Store tendrá Sandbox obligatorio

La seguridad en los dispositivos móviles se ha vuelto un tema sumamente importante, debido a que cada vez es posible realizar más acciones con ellos, lo que directamente implica una mayor pérdida de información en caso de que este sea vulnerado. Debido a esto, cada vez se están generando más ataques a estos dispositivos, por

Linux Tsunami para Mac OS X

Los sistemas Linux y Mac, siempre se caracterizaron, entre otras cosas, por tener mayor seguridad en relación a los ataques de los creadores de malware. Esto se debe a que el mayor porcentaje de los usuarios a nivel mundial poseen las distintas versiones de los sistemas Windows, por lo que les es más conveniente generar

Where there’s smoke, there’s FireWire

Forensic software developer PassWare announced a new version of its eponymous software forensics kit on Tuesday. Already several news sources are writing about how the program can automatically obtain the login password from a locked or sleeping Mac simply by plugging in a USB flash drive containing their software and connecting it to another computer

Social engineers don’t care about your OS: and nor should you

Security companies in general and, unfortunately, anti-malware companies in particular, are often accused of ‘hyping’ threats because of a perceived self-interest. However, in the main, legitimate vendors and researchers like those at ESET typically try to resist overhyping or playing up threats where possible, in favor of more balanced discussion that can help customers take

Quicktime,malicious movies and Angelina Jolie

…criminals are making use of the fact that Quicktime Player 7.6.6 allows movie files to trigger file downloads…the volume of reports picked up our ThreatSense.Net® telemetry suggests the likelihood of significant prevalence, though by no means an epidemic right now…

Apple Quietly Updates Malware Protection

Apple Insider has reported that Apple has silently added rudimentary protection for a threat that they call HellRTS. Our own David Harley has blogged about this at http://macviruscom.wordpress.com/2010/06/18/apples-covert-anti-malware-ops/. At the same time that Apple tries to fool users into thinking that malware doesn’t run on Macs, Apple is very slowly beginning to add very basic

Mac to the Future

I like Macs. Not in an "OS X is God's own Operating System" sort of way, but I've owned/used many Macs, from SE/30s and IICX's to iMacs, eMacs and Macbooks. In fact, at least two of my books were written on the Powerbook which was my workhorse machine in my last couple of years at

Mac Malware OSX/OpinionSpy

A spyware application Intego calls OSX/OpinionSpy is being spread as part of the installation process for a number of screensavers and other apps.

Apple may or may not equal security

iPad and iPhone development and security issues are across the blogosphere and traditional media today. Starting with some interesting antivirus industry news concerning the iPad… Apple iPad users are being offered a security program to scan their new device for vulnerabilities and rogue software should such things emerge as threats. Hailing it as the first

So Apple really doesn’t have a security problem?

I see that Bill Ray of the Register has also picked up on the iPad jailbreaking issue I blogged on yesterday.  (No, I don't suppose he read it there.) Interestingly, though, he talks much less about the security implications than about the slow take-up of  newspaper subscriptions among early adopters. Andy Greenberg, on the other hand,

iPad jailbreaking meets Dr. Who and Inspector Gadget

[Update: it appears that the information I had earlier was incorrect or out-of-date, and there has been loss of life. There's also a report from TechHerald suggesting early exploitation of the incident for SEO poisoning leading to fake AV. However, a quick scan currently (Monday evening) shows news items from such known malefactors as the

Run! It’s the Fuzz!

Unfortunately, I'm not able to attend the CanSecWest 2010 conference in Vancouver this week, though I think Pierre-Marc will be there. I would have been more than a little interested in Charlie Miller's presentation on fuzzing Mac applications: that is, “…a method for discovering faults in software by providing unexpected input and monitoring for exceptions.” 

NOD32 Antivirus for Mac: Some Questions

These are a few questions relating to ESET's antivirus scanner for OS X, which is currently in beta, that I was asked in response to a post at Mac Virus. (If you want to take the beta out for a spin, you can still download it at http://beta.eset.com/macosx.) As these questions are very ESET-specific, I

The out-of-control decade

We interrupt our – well, my - scheduled programming to bring to your attention an article in "The Register" that I think deserves your attention. I put up what was intended to be a brief pointer on the AVIEN blog (http://avien.net/blog/?p=253), but I found myself kind of warming to the subject, to the extent that I

Top Ten Trite Security Predictions

1. Every security blogger in the world will mark the transition from 2009 to 2010 with at least one top ten something-or-other article. Except me, of course.  2. There will be headlines about the death of anti-virus, and a famous security guru will state that anti-malware only catches malware that's already been identified and analysed, that

iBot Mark 2: Go Straight To Jail Do Not Pass Go

[Update, courtesy of Mikko: this worm targets at least one Dutch bank, and activates when users go to the online bank with an infected iPhone ] [Update 2, courtesy of Paul Ducklin: how to change the password of an infected phone. I could just tell you what the password is, but you might want to read

iWorm ikee: Sex and Drugs and Rick and Roll

The iPhone, it seems, is under siege: a recent worm exploits a known (and previously exploited) vulnerability that affects the owners of "jailbroken" phones on which OpenSSH has been installed. (Jailbreaking allows iPhone users to install and use unapproved applications.) Of course, there's been an enormous amount of media coverage on this already (I've just

Not all Mac users are naive about security

I’m often exasperated by blinkered mindsets in the Mac community, of the security-related kind that Randy highlighted in a recent blog. You might have picked up a certain irritation in some of my blogs around the end of last month relating to Snow Leopard and malware detection, too. So it was refreshing to come across a light

419 and Mac scams

I forwarded this to myself from another account yesterday because I thought it was one of the laziest 419 scam messages I’d ever seen. From: British Tobacco Company Sent: 27 August 2009 19:46 Subject: Contact Mr Paul Adams Congratulations! Your e-mail ID was among the selected lucky winners of £1,000.000.00 GBP in our BRITISH TOBACCO

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

14 articles related to:
Hot Topic
05 Jan 2012
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.