Follow The Safe Mac on Twitter to stay advised of the latest Mac security news!
Posted on December 13th, 2012 at 12:38 PM EST
Dr. Web announced the discovery of a new Mac trojan, which they call SMSSend, on Tuesday. This latest trojan masquerades as an installer for the legitimate VKMusic application. Rather than install malicious software on your computer, however, the malicious installer requests a cell phone number in order to complete the install process. Users who provide a cell phone number, and then enter the activation code that is texted to that phone, will be subscribed to a “service” that applies charges their cell phone account. Read the rest of this entry »
Posted on December 6th, 2012 at 9:53 PM EST
Windows users have been plagued for years by malware and junkware that causes their web browsers to redirect to undesired pages, advertisements to be injected in web pages, changes to the home page and search engine settings and other undesirable behaviors. Unfortunately, this is now spreading into the Mac world. Reports of these kinds of issues are becoming increasingly common, and confused users don’t know how to handle it. (I hear a lot of comments like, “I Googled it, but all the instructions were for Windows users!”) So what is a Mac user supposed to do when faced with such problems? Read the rest of this entry »
Posted on December 3rd, 2012 at 12:27 PM EST
Several security companies are reporting today that Dockster has been discovered “in the wild.” Malicious Java applets have been discovered on a site dedicated to the Dalai Lama. These applets use the same vulnerabilities that Flashback took advantage of to install Dockster on Macs that visit the site. Of course, those vulnerabilities have been patched for quite some time now, so no properly-updated Mac running the latest versions of Snow Leopard (10.6), Lion (10.7) or Mountain Lion (10.8) can be infected. Unfortunately, the malware does support PowerPC processors, so older machines, with insecure versions of Java enabled in the web browser, could be vulnerable to infection. For more information, see Sophos’ report.