123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Apple Issues Security Update To Combat Counterfeit Security Software Campaign Of Cybercriminals

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In the recent times, cybercriminals have been targeting Mac users with fake anti-virus solutions. Scammers are using search engine poisoning to lead Internet users to malicious websites. When users search for images related to latest news such as Royal Wedding, Osama Bin Laden's death or even Mother's day, they also receive poisoned search results. Users who happen to visit a malicious website, receive a pop-up of a fake anti-virus scanner, which alerts that system is infected with malware. The attack seeks users to download "anti-virus" software, which comes in the form of a MacDefender, MacGuard, MacProtector and MacSecurity. The software is actually a malware, designed to extract confidential information such as credit card numbers. The attack comes in various variants. While the earlier versions of the attack sought administrator password from users to download the malware, security researchers recently identified a new version of the attack wherein users are not required to enter passwords. When users visit a specially crafted malicious site, the malware is downloaded automatically in their systems. In some cases, attackers ...
... extract personal and financial information such as name, address, contact numbers, e-mail address and credit card numbers by enticing users to purchase the fake security software.

Recently, Apple released a security update to detect and delete MacDefender malware and other variants. The latest update is available for Mac OS X 10.6.7 (Snow Leopard). The update has added the definition of MacDefender and other variants in circulation enabling examination of downloaded files and alerting users against malicious downloads. The new update will allow the system to check for daily updates to the file quarantine malware definition list and automatically update the known malware definitions. Users have the option to uncheck the daily additions to malware definitions. According to the security update by Apple, the latest update will detect and remove the known variants of the malware during the installation process and alert users after completion of installation.

Snow Leopard users must immediately install the update by directly visiting the site of the vendor or clicking on software updates option. Internet users must be wary of clicking on suspicious links in search results, third party links on legitimate websites, and links in e-mail coming from unknown sources. They must download genuine anti-virus software by directly visiting the site of a legitimate security software vendor. As attackers may use social engineering techniques to make users reveal privileged information, organizations must create awareness on security threats among employees through huddle sessions and workshops. Attackers may impersonate as a peer, subordinate, superior or stakeholder to extract privileged business or customer information from employees. Employees may also fulfill their security training requirements through online degree courses on cyber security.

Hiring professionals qualified in computer science degree and masters of security science may help organizations in timely detection of threat vectors and initiating mitigating measures.

Cybercriminals constantly evolve their modus operandi to deceive Internet users, and breach computer and network security. Therefore, IT professionals must update their technical skills and know-how to deal with ever evolving cyber security threats. They may leverage online university degree, online training and iPad training programs to enhance their capabilities.

Total Views: 394Word Count: 525See All articles From Author

Add Comment

Computers Articles

1. Remote Connectivity | Business Broadband Without Fibre India | Viva Digitally
Author: Viva

2. Spark Matrix™: Speech Analytics
Author: Umangp

3. Custom Computer Manufacturer: How To Choose The Right One For Your Needs?
Author: Jack Williams

4. Riding Up: The Surge Of Elevators And Escalators Across Asia Pacific
Author: Pujitha

5. Why Businesses In Mumbai Need Custom Software Development
Author: Aimbeat Insights

6. How A Multi-service App Can Transform Your Business Growth
Author: Swiza Joy

7. Advanced Humidity Monitor And Equipment Temperature Monitoring Solutions For Reliable Healthcare And Business Environments With Tempgenius Expertise
Author: Chris Miller

8. Why You Need Modern Telecom Sales Commission Management Systems To Boost Sales Efficiency
Author: Kevin

9. Why Access Reviews Keep Failing In Regulated, Hybrid Environments
Author: Soham Biswas

10. Building A Modern Real Estate App With Trulia Clone App Script
Author: Swiza Joy

11. Spark Matrix™: Multi-carrier Parcel Management Solutions
Author: Umangp

12. Best Odoo Erp Software Company In Dubai For Business Growth
Author: Mayur Meheshwari

13. Top Challenges Faced By Equipment Rental Companies In The Uae — And How Erp Solves Them
Author: Al murooj solutions

14. Spark Matrix™: Intelligent Virtual Assistants (iva)
Author: Umangp

15. Pos Software Designed For Retail Operations
Author: EPOS Direct

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: