The Latest in IT Security

Posts Tagged ‘mac users’

If you haven’t updated the Java installation you might be exposed to the newest exploit identified as CVE-2012-0507. The exploit allows the bypassing of Java’s sandbox, a mechanism that is designed partly to prevent attacks from malicious code. Through the exploit are currently Zeus-Trojans downloaded and silently installed in the system. Avira software detects this […]

Read more ...

Intego has been examining several samples of new Mac malware, Tibet.C, which uses Word documents to install a backdoor on Macs. The infected Word files look like real files when users double-click them – they display text just like regular Word files – but actually contain three parts, that are concatenated within the file, and […]

Read more ...

After our previous finding involving a targeted attack whose payload were OS-dependent, we encountered a more recent run that leads to a malicious file specifically affecting Mac OSX. The said malware, detected as TROJ_MDROPPER.LB, is a MAC RAT/backdoor being used in Pro-Tibetan targeted campaigns, as initially described by Alienvault. In investigating the campaign, we found […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments