Posted on April 23rd, 2012 by Peter James Intego has discovered a new variant of the Flashback malware, Flashback.S, which continues to use a Java vulnerability that Apple has patched. No password is required for this variant to install, and it places its files in the user’s home folder, at the following locations: ~/Library/LaunchAgents/com.java.update.plist ~/.jupdate It then deletes all files a
Malware + Recommended Malware: OSX/flashback.A Risk: Low; this malware has been found in the wild, and may fool Mac users who don’t have Flash Player installed. However, Intego so far has only one report of this malware, and a sample provided by a user who downloaded it from a malicious web site. Description: Intego has discovered a new Trojan horse, Flashback, which masquerades as a Flash Playe
Malware + Recommended Malware: OSX/MacDefender.F and OSX/MacDefender.G Risk: Medium; effective SEO poisoning has led many Mac users to this type of malware, and no administrator password is required to install this new variant. Description: On May 2, 2011, Intego discovered the MAC Defender fake antivirus, which targets Mac users via SEO poisoning attacks (web sites set up to take advantage of s
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く