Your Mac Operating System users (Apple)? Although known resistance to virus attacks than their arch-rivals (Windows OS), they were also able impenetrable virus / trojan. While this is not the first time Mac got a virus. So it seems that now you have to be careful, especially when using it for online. A well-known antivirus companies from Russia, reported more than half a million Mac is infected with Trojan Flashback, packet malware (malicious software) that is designed to steal personal information. Trojan refers to a form of suspicious software that can damage a system or network. The purpose of the Trojan is to obtain information from the target (passwords, user habits are recorded in the system log, data, etc.) and control target (gain privileges on the target). Russian antivirus company, is the Dr. Web, initially reported 5 April 2012 and 550 000 Macintosh Mac computers infected by botnets evolve. But in the future, malware analyst Ivan Sorokin Dr.Web announced via Twitter that the number of infected Mac Flashback increased to 600,000, with 274 of them based in Cupertino, California. More than half of the infected Mac are in the United States (57 percent), while 20 percent are in Canada, says Dr. Web. Malware Origins was originally discovered in September 2011 disguised as a fake Adobe Flash player plug-in installer, but in recent months has evolved to exploit a Java vulnerability to target Mac systems. A new variant that appeared over the weekend seemed to be taking advantage of the vulnerability of the Java patches released for Apple's new recently. How it Works Affecting Victims According to one blogger of the site CNET, Topher Kessler explains, just visiting a malicious Web site containing Flashback on Macs OS X systems with Java applications installed, it will result in one of two routes installations. Malware will ask for the administrator password, and if someone gave it, it will automatically install the package from the code into the Applications folder. If the password is not offered, the malware will install to the user account where it can run more globally. Once installed, Flashback will inject code into web browsers and other applications such as Skype to harvest passwords and other information from the user program. Reportedly security firm F-Secure has published instructions on how to determine whether the infected Mac Flashback.
Posted by Rian Priyadi On Agustus 31, 2012 0 CommentsJika artikel ini bermanfaat,bagikan kepada rekan melalui: