tag
Mac

iPhone and Apple ransom incidents? Don’t delay locking down your i-stuff

Some users of Apple iPhones, iPads and Macs have been getting strange wake up calls and unsettling messages demanding a ransom for access to their devices. Now is the time to make your i-stuff is locked down, even if you don’t live in Australia.

Five tips to help control your privacy on Mac OS X

Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.

Mac malware spread disguised as cracked versions of Angry Birds, Pixelmator and other top apps

Pirated versions of popular Mac apps, spread via torrent sites, try to infect your computer with malware… and steal Bitcoins.

New to Mac? Four security tips you need to know

Mac OS X is a slick, easy-to-use operating system with an impressive record on security – and basic malware detection built in since 2009’s Snow Leopard update. While Macs have seen sales slowing in the past year, due largely to losing market share to their own stablemates, iPads, and other mobile devices, they’re a growing

Knock, knock, unlock: New app unlocks Macs with two taps on your iPhone

A new app lets you unlock Mac computers without entering a password – users simply tap on a paired iPhone with the Knock app when near the Mac, and it opens up.

Tech support scam update: still flourishing, still evolving

[Update 30th October 2013: with regard to the ping gambit discussed below, please note that protection.com now responds to ICMP echo requests - in other words, if you now run the command "ping protection.com" you should now see a screen something like this: Note that this is perfectly normal behaviour for a site that responds

Why Mac security product testing is harder than you think

As both Macs and Mac malware increase in prevalence, the importance of testing the software intended to supplement the internal security of OS X increases too. But testing security products on Mac is tricky, due to Apple’s own countermeasures. Can it be made easier?

From flicks to clicks: Mac OS X Trojan Adware.Yontoo infects via fake codec

Protection and remediation tips for Mac OS X users targeted by a Trojan adware plugin called Yontoo hidden behind movie trailer and other media playing links, generating money for criminals exploiting online ad schemes.

Straight facts about Mac malware, threats and responses

Does your Apple Mac need antivirus software, or any other kind of security software? This question has been asked repeatedly over the years and I think the “correct’ answer has changed over time.

Your Apple Mac made even safer: Part 3 of securing new devices

If you recently acquired an Apple Mac computer there are several simple steps you can take to protect your new machine, and all of the valuable information you will be storing on it.

Think before you take that old computer to the city dump

We tend to replace our computers more often these days but how do you ensure that you don’t give away your data when you pass on that old desktop or laptop? Here are our top tips for safer computer disposal.  Back up your data Before you do anything with your existing PC or laptop, ensure

Flashback Wrap Up

Six months ago, Flashback was attracting a lot of attention from researchers and media due to its wide spread and interesting features. Since then, we have witnessed its operator abandoning control of the botnet by shutting down its latest command and control server. This happened in May this year. The number of infected systems has

Flashback Wrap Up

Six months ago, Flashback was attracting a lot of attention from researchers and media due to its wide spread and interesting features. Since then, we have witnessed its operator abandoning control of the botnet by shutting down its latest command and control server. This happened in May this year. The number of infected systems has

Mac OSX/iOS hacks at Blackhat – are scammers setting their sights?

For years scammers and hackers  focused largely on Windows x86-based platforms, in many ways because that’s where the bulk of the users were. But times change, and new targets emerge. At Blackhat and Defcon last week we saw a flurry of talks on Mac OSX/iOS security,  trying to illuminate possible chinks in the armor. From

WordPress vector de propagación de Flashback

Es conocida ya la repercusión y el impacto que tuvo Flashback en las últimas semanas. La afamada botnet ya tiene un gran número de sistemas Mac infectados a lo largo del mundo. Sin embargo, el tema que llama la atención estos días, es como se propagó. Unos de los vectores principales fue la plataforma de

Fighting the OSX/Flashback Hydra

The biggest Mac botnet ever encountered, the OSX/Flashback botnet, is being hit hard. On April 12th, Apple released a third Java update since the Flashback malicious code outbreak. This update includes a new tool called MRT (Malware Removal Tool) which allows Apple to quickly push malware removal code to their user base. The first mission

Malware 2011 para Mac y la educación de los usuarios

Desde el Laboratorio de Investigacion de ESET Latinoamérica siempre afirmamos que uno de los pilares fundamentales para lograr un uso más seguro de las computadoras y dispositivos móviles es la educación de los usuarios. Por lo mismo, las diferentes compañías pertenecientes a la industria de la computación pueden esmerarse por mejorar la seguridad de sus

Vulnerabilidad crítica en Adobe Reader y Adobe Acrobat

Una de las cosas que tratamos de hacer especial hincapié es la importancia de mantener actualizados a todo momento tanto el sistema operativo que maneje, ya sea Windows, GNU Linux o Mac, así como también los programas que posean. Esto es porque muchas veces son descubiertas nuevas vulnerabilidades que son aprovechadas por los creadores de

Linux Tsunami para Mac OS X

Los sistemas Linux y Mac, siempre se caracterizaron, entre otras cosas, por tener mayor seguridad en relación a los ataques de los creadores de malware. Esto se debe a que el mayor porcentaje de los usuarios a nivel mundial poseen las distintas versiones de los sistemas Windows, por lo que les es más conveniente generar

Linux Tsunami hits OS X

We’ve just come across an IRC controlled backdoor that enables the infected machine to become a bot for Distributed Denial of Service attacks. The interesting part about it is that it’s a Mach-O binary – targeting Mac OS X. ESET’s research team compared this to samples in our malware collection and discovered that this code

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
28 May 2014
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.