Sunday, April 8, 2012

Talkcast tonight, 10pm ET: Fighting Flashback

As this holiday weekend draws to a close, the unfortunate fact is that we may be dealing with the largest Mac-centric botnet [1] ever documented in the wild [2] . While the Flashback trojan is easy to find [3] and simple to prevent [4] â€" in fact, a stock Lion installation includes neither Java nor the Flash plugin, cutting down dramatically on the attack surface [5] for malware of this kind â€" there are still thousands [6] of compromised Macs out there.

Given the requirements of a Java installation to enable the trojan’s exploit, it looks like a nontrivial number of infections have hit experienced Mac users [7] . We recommend immediately updating your Java install with Apple’s patch [8] . You can test for the Flashback trojan [9] using the standalone Terminal method [10] or a simple utility [11] â€" and you can also install some free virus protection [12] if you’re so inclined.

That’s our topic for tonight’s Talkcast, same as it was two weeks ago [13] : Mac (and iOS) security. We welcome your calls, questions and comments at 10 pm ET, 7 pm PT tonight live on Talkshoe.

To participate in the call, you can use the browser-only Talkshoe client [14] , the embedded Facebook app [15] , or download the classic TalkShoe Pro Java client [16] ; however, for +5 Interactivity, you should call in. For the web UI, just click the Talkshoe Web button on our profile page [17] at 4 HI/7 PDT/10 pm EDT Sunday. To call in on regular phone or VoIP lines (Viva free weekend minutes!): dial (724) 444-7444 and enter our talkcast ID, 45077 â€" during the call, you can request to talk by keying in *8.

If you’ve got a headset or microphone handy on your Mac, you can connect via the free X-Lite [18] or other SIP clients â€" basic instructions are here. [19] Skype users with dial-out credit can call in via the service, or use those free iPhone minutes. Talk to you tonight!

Talkcast tonight, 10pm ET: Fighting Flashback [20] originally appeared on TUAW â€" The Unofficial Apple Weblog [21] on Sun, 08 Apr 2012 17:00:00 EST. Please see our terms for use of feeds [22] .

Source | Permalink | Email this | Comments [23] [24] [25] [26]

Add to digg
Add to del.icio.us
Add to Google
Add to StumbleUpon
Add to Facebook
Add to Reddit
Add to Technorati


Sourced from The Unofficial Apple Weblog (TUAW) [27]

Links
  1. ^ Mac-centric botnet (nakedsecurity.sophos.com)
  2. ^ documented in the wild (news.drweb.com)
  3. ^ easy to find (www.tuaw.com)
  4. ^ simple to prevent (tidbits.com)
  5. ^ cutting down dramatically on the attack surface (nakedsecurity.sophos.com)
  6. ^ thousands (www.securelist.com)
  7. ^ hit experienced Mac users (daringfireball.net)
  8. ^ Apple’s patch (support.apple.com)
  9. ^ Flashback trojan (www.macworld.com)
  10. ^ standalone Terminal method (www.f-secure.com)
  11. ^ simple utility (rsdeveloper.com)
  12. ^ free virus protection (www.sophos.com)
  13. ^ same as it was two weeks ago (www.tuaw.com)
  14. ^ browser-only Talkshoe client (www.talkshoe.com)
  15. ^ Facebook app (www.facebook.com)
  16. ^ TalkShoe Pro Java client (download.talkshoe.com)
  17. ^ our profile page (www.talkshoe.com)
  18. ^ X-Lite (www.counterpath.com)
  19. ^ basic instructions are here. (mediaminutes.net)
  20. ^ Talkcast tonight, 10pm ET: Fighting Flashback (www.tuaw.com)
  21. ^ TUAW â€" The Unofficial Apple Weblog (www.tuaw.com)
  22. ^ terms for use of feeds (www.weblogsinc.com)
  23. ^ Source (www.talkshoe.com)
  24. ^ Permanent link to this entry (www.tuaw.com)
  25. ^ Send this entry to a friend via email (www.tuaw.com)
  26. ^ View reader comments on this entry (www.tuaw.com)
  27. ^ The Unofficial Apple Weblog (TUAW) (feeds.tuaw.com)

No comments:

Post a Comment

Search This Blog