Follow The Safe Mac on Twitter to stay advised of the latest Mac security news!
Posted on June 21st, 2013 at 4:06 PM EST
I wrote about the problems with Genieo a couple times last month, when it was discovered that Genieo was being downloaded through fake Flash Player update pop-ups on some sites. Further research showed suspicious code inside the Genieo installer. Following those developments, Dr. Web and Intego both decided to add detection of Genieo as malware to their anti-virus products. Folks from Genieo’s support informed me that these problems would be taken care of. Unfortunately, one month later, it looks like problems with Genieo persist. Read the rest of this entry »
Posted on June 18th, 2013 at 8:43 PM EST
This still doesn’t change my opinion that Java needs to be avoided. These fixes came after almost two months of vulnerability, and Java has had a recent history of becoming vulnerable again within days of each fix. We’ll see how things fall out at this point, but I don’t have high hopes. If you have to use Java in your web browser, though, you should not delay installing this update. Be cautious, though, as some Java applets may not function well (or at all) with the update, so check compatibility beforehand. Of course, that may leave you in the unenviable position of having to choose between staying vulnerable and losing access to the applet that you need Java for in the first place.
Posted on June 11th, 2013 at 9:29 PM EST
Microsoft issued an update for Office 2011 today that could lead to code execution by simply opening a maliciously-crafted Office document. As with today’s Flash update, there’s no currently known Mac malware taking advantage of this, but there’s no sense letting it appear before you take action. If you’re using Office 2011, update it immediately!
Posted on June 11th, 2013 at 9:24 PM EST
Adobe released an updated version of Flash Player today to fix a vulnerability that could allow an attacker to execute malicious code on a user’s system. Fortunately, there’s no Mac malware known to be taking advantage of this, and Apple will probably use their XProtect software to block vulnerable versions of Flash soon. Nonetheless, all users of Flash should update immediately. Those running Chrome will have its built-in copy of Flash updated automatically, and need not have Flash installed separately.
Posted on June 11th, 2013 at 9:07 AM EST
News about the US government’s PRISM program, which supposedly had direct access to the servers of numerous large companies, has been everywhere. It’s got all the great hooks of any good conspiracy theory: invasion of privacy, abuse of power, cover-ups on a massive scale, etc. That’s a bit of a problem, though… how could such a story be true? How is it that the government has been siphoning data from all these different companies for years without anyone ever saying anything about it? Recent developments would seem to indicate that the reason for that is that it isn’t actually true. Read the rest of this entry »
Posted on June 4th, 2013 at 3:41 PM EST
In 2006, a malware researcher going by the name JPanic created a proof-of-concept virus capable of infecting Windows and Linux machines called Capzloq Tekniq. JPanic has now updated this proof-of-concept, and as part of the update, it is now capable of infecting Macs. Read the rest of this entry »