Blog Posts Tagged with "Mac OS X"
Building OS X Trojans With AppleScript, Homoglyphs and iTunes
September 21, 2013 Added by:Tripwire Inc
A year or so ago I stumbled upon a way to create Trojans for OS X by utilizing homoglyphs and a bit of social engineering, I disclosed the vulnerability to Apple and presented it at ToorCamp.
Comments (1)
The Rise of Multi-Platform Malware
July 12, 2012 Added by:Plagiarist Paganini
Using a JAR, the malware is able to identify the OS and download the right files to infect the targeted machine. After identifying the type of operating system a unit is running, a Java class file will download the appropriate malware, with the purpose to open a backdoor to allow remote access to the machine...
Comments (0)
Multi-Platform Backdoor Malware in the Wild
July 11, 2012 Added by:Headlines
"The JAR file checks if the user's machine is running in Windows, Mac or Linux then downloads the appropriate files... the three different platforms behave the same way. They all connect to 186.87.69.249 to get additional code to execute. The ports are 8080, 8081, and 8082 for OSX, Linux, and Windows respectively..."
Comments (0)
OS X Flashback Botnet Analysis from Symantec
May 17, 2012 Added by:Headlines
"Utilizing less than 2% of the entire botnet the attackers were able to generate $14,000 in three weeks, meaning that if the attackers were able to use the entire botnet, they could potentially have earned millions of dollars a year..."
Comments (0)
Symantec Reverse Engineers OS X Flashback Malware
May 14, 2012 Added by:Headlines
Symantec researchers reverse engineered components of the Flashback malware that recently infected more than 600,000 Mac systems and reveal that it was designed in part as a highly profitable ad-clicking operation that could be net the Trojan's creators $10,000 per day...
Comments (0)
Apple Releases OS X and Safari Security Updates
May 11, 2012 Added by:Headlines
Apple has released critical security updates for OS X and Safari to address several vulnerabilities which could allow an attacker to obtain sensitive information, execute arbitrary code, escalate privileges, conduct a cross-site scripting attack, or cause a denial-of-service...
Comments (0)
Multi-Platform Malware Targets Both Widows and Mac OS
April 27, 2012 Added by:Headlines
"If the threat is running on a Mac operating system, it downloads a dropper type malware written in Python. However, if the threat is running on a Windows operating system, it downloads a standard Windows executable file dropper. Both droppers drop a Trojan horse program..."
Comments (0)
Yet Another Flashback Variant Targeting Mac OS X
April 26, 2012 Added by:Headlines
Another Flashback Trojan malware variant has been discovered, and this one is even more insidious than those already identified - it can silently infect a Mac user's device. Flashback.S can stealthily infect a system without having tipped the victim off by requesting a password...
Comments (0)
Apple Releases Flashback Malware Removal Tool and Patches
April 17, 2012 Added by:Headlines
Apple has released a malware removal tool for the most common variant of the Flashback Trojan, as well as security updates to mitigate the vulnerability exploited by the malware for OS X Lion v10.7.3, OS X Lion Server v10.7.3. Mac OS X v10.6.8 and Mac OS X Server v10.6.8...
Comments (0)
SabPub - The Latest Mac OS X Backdoor Java Exploit
April 16, 2012 Added by:Headlines
"This new threat is a custom OS X backdoor, which appears to have been designed for use in targeted attacks... The backdoor contains functionality to make screenshots of the user’s current session and execute commands on the infected machine..."
Comments (0)
Apple: Critical Update for Java for OS X Lion and Mac OS X
April 04, 2012 Added by:Headlines
"Vulnerabilities exist in Java 1.6.0_29, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution..."
Comments (0)
Top Ten Information Security Events from 2011
January 03, 2012 Added by:Headlines
As 2011 was such an eventful year where security is concerned, no doubt many readers will point to numerous instances where they feel an episode was overlooked that should have been included in the top ten - but hey, you have to draw the line somewhere...
Comments (0)
Enterprise Mac Security - Mac OS X Snow Leopard
August 14, 2011 Added by:Tony Campbell
Enterprise Mac Security is an absorbing read and equally applicable to securely configuring a Mac server as it is to a Mac laptop. There is so much good quality security material available that it would be easy to allow a review to almost become a book in its own right...
Comments (1)
Mac Antivirus - Being Careful and Staying Safe
June 09, 2011 Added by:Bozidar Spirovski
What antivirus software packages have a Mac version? As of June 2011, Wikipedia lists that only 16 out of 62 antivirus software packages support the Mac. In a very interesting marketing move, some antivirus manufacturers actually offer free use of antivirus packages for Mac...
Comments (0)
Skype IM (MAC OS X) - Is This The Zero-Day ?
May 08, 2011 Added by:Rohit Bansal
Skype fails to instantiate between the payloads that are sent as hyperlinks in the chat window. The attacker only requires a definitive payload to exploit this issue. Basically, we call it as a Skype Remote Scripting Injection...
Comments (0)
Multi-platform Java Botnet Targets Widows and Mac OSX
May 06, 2011 Added by:Headlines
Multi-platform malware is not entirely new, but with the increasing popularity of Apple products in the marketplace, there is an incentive for malware authors to save time and resources by developing strains that are capable of infecting multiple operating systems...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization