Recent Articles

Azureus : The Latest Search Engine Hack
This interesting Google hack returns 134 entries in Google, and 63 in Microsoft's search engine, Yahoo returns 216 results. This quick Google hack allows someone to go in and see what someone is sharing with Azureus, one of the more popular bitto...

Sinowal Is A Serious Security Threat
RSA Security Blog has a fascinating digest of the Sinowal Trojan, and the idea that is has been in operation since 2006, compromising nearly 300,000 on line banking accounts. There is always a fascination to malware in many ways malware can be considered an element...

Belgium Outlaws Hacker Tools, Leaves Security...
When good laws go bad, Belgium opens the door to some seriously fun Google Hacking, by outlawing tools, but not addressing poor security measures in the first place. Google hacking is a great way of testing...

11.24.08

Two Fresh Apple Security Hacks

By Dan Morrill

Two new chunks of malware are making the rounds this week that allow an attacker to download code of choice on your apple computer.

What is interesting is that with the increase in sales, and market penetration of Apple computers it is still hard to find software that can actually compromise one. While this is great for Apple, it more likely means that Windows makes the best target out there, and Apple hacking (other than breaking Apple's DRM or Jailbreaking Iphones) has not really caught on yet.

OSX.RSPlug.D was found by Intego, and is your common run of the mill Trojan that pretends to be something useful, in this case a video codec so you can watch the movie you just downloaded.

The other is OSX.TrojanKit.Malez also found by Intego that is a program that installs on the Apple computer and allows for full remote control of the box in classic making a bot net fashion.


Both of these programs requires someone to click on install, or hide themselves in other programs that offer something that a user might want. As always, make sure you are downloading code from a reliable source, and if it does not play in VLC player, it is not worth watching.

Comments


About the Author:
Dan Morrill has been in the information security field for 18 years, both civilian and military, and is currently working on his Doctor of Management. Dan shares his insights on the important security issues of today through his blog, Managing Intellectual Property & IT Security, and is an active participant in the ITtoolbox blogging community.
About NetworkNewz
NetworkNewz editors, writers and contributors focus on both the big picture and the details of networking. At NetworkNewz our goal is to deliver to you The Key To Network Management.





NetworkNewz is brought to you by:

SecurityConfig.com NetworkingFiles.com
ITmanagementNews.com WebProASP.com
DatabaseProNews.com SQLProNews.com
ITcertificationNews.com SysAdminNews.com
LinuxProNews.com WirelessProNews.com
CProgrammingTrends.com ITmanagementNews.com





-- NetworkNewzis an iEntry, Inc. publication --
iEntry, Inc. 2549 Richmond Rd. Lexington KY, 40509
2008 iEntry, Inc. All Rights Reserved Privacy Policy Legal

archives | advertising info | news headlines | newsletters | comments/feedback | submit article


The Keys To Network Management Ask Questions in the Networking Forum NetworkNewz News Archives About Us Feedback NetworkNewz Home Page About Article Archive News Downloads WebProWorld Forums Jayde iEntry Advertise Contact