As this holiday weekend draws to a close, the unfortunate fact is that we may be dealing with the largest Mac-centric botnet [1] ever documented in the wild [2] . While the Flashback trojan is easy to find [3] and simple to prevent [4] â" in fact, a stock Lion installation includes neither Java nor the Flash plugin, cutting down dramatically on the attack surface [5] for malware of this kind â" there are still thousands [6] of compromised Macs out there.
Given the requirements of a Java installation to enable the trojanâs exploit, it looks like a nontrivial number of infections have hit experienced Mac users [7] . We recommend immediately updating your Java install with Appleâs patch [8] . You can test for the Flashback trojan [9] using the standalone Terminal method [10] or a simple utility [11] â" and you can also install some free virus protection [12] if youâre so inclined.
Thatâs our topic for tonightâs Talkcast, same as it was two weeks ago [13] : Mac (and iOS) security. We welcome your calls, questions and comments at 10 pm ET, 7 pm PT tonight live on Talkshoe.
To participate in the call, you can use the browser-only Talkshoe client [14] , the embedded Facebook app [15] , or download the classic TalkShoe Pro Java client [16] ; however, for +5 Interactivity, you should call in. For the web UI, just click the Talkshoe Web button on our profile page [17] at 4 HI/7 PDT/10 pm EDT Sunday. To call in on regular phone or VoIP lines (Viva free weekend minutes!): dial (724) 444-7444 and enter our talkcast ID, 45077 â" during the call, you can request to talk by keying in *8.
If youâve got a headset or microphone handy on your Mac, you can connect via the free X-Lite [18] or other SIP clients â" basic instructions are here. [19] Skype users with dial-out credit can call in via the service, or use those free iPhone minutes. Talk to you tonight!
Talkcast tonight, 10pm ET: Fighting Flashback [20] originally appeared on TUAW â" The Unofficial Apple Weblog [21] on Sun, 08 Apr 2012 17:00:00 EST. Please see our terms for use of feeds [22] .
Source | Permalink | Email this | Comments [23] [24] [25] [26]
Sourced from The Unofficial Apple Weblog (TUAW) [27]
Links
- ^ Mac-centric botnet (nakedsecurity.sophos.com)
- ^ documented in the wild (news.drweb.com)
- ^ easy to find (www.tuaw.com)
- ^ simple to prevent (tidbits.com)
- ^ cutting down dramatically on the attack surface (nakedsecurity.sophos.com)
- ^ thousands (www.securelist.com)
- ^ hit experienced Mac users (daringfireball.net)
- ^ Appleâs patch (support.apple.com)
- ^ Flashback trojan (www.macworld.com)
- ^ standalone Terminal method (www.f-secure.com)
- ^ simple utility (rsdeveloper.com)
- ^ free virus protection (www.sophos.com)
- ^ same as it was two weeks ago (www.tuaw.com)
- ^ browser-only Talkshoe client (www.talkshoe.com)
- ^ Facebook app (www.facebook.com)
- ^ TalkShoe Pro Java client (download.talkshoe.com)
- ^ our profile page (www.talkshoe.com)
- ^ X-Lite (www.counterpath.com)
- ^ basic instructions are here. (mediaminutes.net)
- ^ Talkcast tonight, 10pm ET: Fighting Flashback (www.tuaw.com)
- ^ TUAW â" The Unofficial Apple Weblog (www.tuaw.com)
- ^ terms for use of feeds (www.weblogsinc.com)
- ^ Source (www.talkshoe.com)
- ^ Permanent link to this entry (www.tuaw.com)
- ^ Send this entry to a friend via email (www.tuaw.com)
- ^ View reader comments on this entry (www.tuaw.com)
- ^ The Unofficial Apple Weblog (TUAW) (feeds.tuaw.com)
No comments:
Post a Comment