|OS X Trojan Takes Users Unawares|
Macs running OS X are often touted as the most secure machines. While OS X is definitely more secure than other operating systems, it may not be as secure as owners think. A new trojan that takes advantage of a security flaw in OS X has been discovered, and it’s a doozy. This has the potential to be a security nightmare.
If you mention “OS X” and “virus” in the same sentence, you’ll get some weird looks from Mac users. Traditionally viruses and trojans on OS X were near non-existent, but there’s a Mac specific trojan, codenamed Flashback, that has affected more than 600,000 computers. This is big news as it shows that machines running OS X may not be as secure as first thought.
Many Mac owners are unsure of what exactly the Flashback trojan is, what it does and how to ensure they’re not infected. We’re here to help clarify the situation.
What is a Trojan and What Does Flashback Do?
When the program is installed, Flashback will download and install the main trojan code without the need for permission from the administrator. From there it proceeds to hijack your browser, redirect search queries to websites developed by hackers, and then take advantage of pay-per-click advertising.
Why Should I be Worried?
How do I Ensure My Mac is Clean?
While the patch will prevent Flashback from working, it won’t delete the program if you’ve been infected. The Internet security company F-Secure has developed a script that scans your computer and removes Flashback if found. Once you have downloaded the script, open and run it. The script will search your computer and place the infected files in an encrypted ZIP folder labeled Flashback_quarantine.zip.
Flashback has infected a higher number of Macs than any other trojan to date and goes to show that Macs also have security flaws. This also serves as a reminder that you should have a virus scanner and security program running on your Mac. If you have any questions regarding the security of your Mac or other devices, please don’t hesitate to contact us. We are here to help keep your machines secure.
Published with permission from TechAdvisory.org. Source.
|Get Your Business Ready for VoIP|
Technology has advanced at a rapid pace over the past 30 years, with many devices moving from physical systems to digital versions, including one of the most useful: the telephone. While the use of landlines is still prevalent among some businesses, many have started to turn to the digital version, Voice over Internet Protocol, or VoIP.
|Software or Template? A BCP Roadblock|
One issue that’s gaining steam, especially with SMEs, is business continuity planning. Many companies are starting to develop plans so that they can continue to operate through both problems large and small. If you’re one such company, and are stuck at the point where you need to choose between software and templates, we have some advice for you.
|P2P and Cloud Storage Can Have Risk|
Does your company use cloud storage services or peer-to-peer (P2P) networks for the storage and sharing of data? Many businesses are now using both these services in an effort to make work less complicated. But did you know that there are potential issues in relation to recoverability and security of data?
|Spring Springs Ahead to Version 3.1|
One of the biggest complaints of many Java developers is that when they are asked to develop an application, they have to often develop frameworks before they can write the program. This is a time consuming process. To help make the developer’s job easier, VMWare introduced Spring, a framework for Java developers. Spring was recently updated, read on to learn more.