<#webadvjs#>

Announcement

Collapse
No announcement yet.

Experts: Macs no longer virus proof, Malicious program targets Macs

Collapse
  • Filter
  • Time
  • Show
Clear All
new posts

    [LMAO!] Experts: Macs no longer virus proof, Malicious program targets Macs

    Macintosh now what is going to be their advertisment over pc's?

    (CNN) -- Mac computers are known for their near-immunity to malicious computer programs that plague PCs.
    Some security experts say viruses are moving toward Mac as those computers become more popular.

    Some security experts say viruses are moving toward Mac as those computers become more popular.

    But that may be changing somewhat, according to computer security researchers. It seems that as sleek Mac computers become more popular, they're also more sought-after targets for the authors of harmful programs.

    "The bad guys generally go toward the biggest target, what will get them the biggest **** for their buck," said Kevin Haley, a director of security response at Symantec.

    Until recently, the big target always was Microsoft Windows, and Apple computers were protected by "relative obscurity," he said.

    But blogs are buzzing this week about what two Symantec researchers have called the first harmful computer program to strike specifically at Mac.

    This Trojan horse program, dubbed the "iBotnet," has infected only a few thousand Mac machines, but it represents a step in the evolution of malicious computer software, Haley said.

    The iBotnet is a sign that harmful programs are moving toward Mac, said Paul Henry, a forensics and security analyst at Lumension Security in Arizona.
    Don't Miss

    * Should you heed all your software updates?
    * Is it really safe to download software?
    * A to Z of online piracy

    "We all knew it was going to happen," he said. "It was just a matter of time, and, personally, I think we're going to see a lot more of it."

    The malicious software was first reported in January. It didn't gain widespread attention until recently, when Mario Ballano Barcena and Alfredo Pesoli of Symantec, maker of the popular Norton antivirus products, detailed the software in a publication called "Virus Bulletin."

    Mac users at large, however, should not be alarmed by the incident, experts said. The program infects only computers whose users downloaded pirated versions of the Mac software iWork.

    The harmful software is a Trojan horse, meaning it tries to sneak into the computer with some sort of permission from the user. Computer worms travel differently. They wiggle their way into computers and replicate without the owner's approval or knowledge.

    The Mac program is called a botnet because infected computers become part of a network that is controlled by the program's author.

    The Mac botnet is significantly less threatening than computer worms like the much-publicized Conficker.c, said Jose Nazario, a senior security researcher with Arbor Networks. Conficker was thought to have infected up to 10 million computers, compared with thousands for the iBotnet, researchers said.

    There's also some question as to whether it is the first botnet to target Mac. Others have targeted both PCs and Apple computers.

    "This isn't the first botnet that's been built using Mac computers," Nazario said. "This is an interesting one in that it's a little more flexible and includes some new features. ... It's getting a lot of press mostly because it's Mac and people are talking about how Macs are immune to ******* -- and, sure enough, they're not."

    The potential damage that could be caused by the Mac botnet is also less severe than other attacks, said Darrell Etherington, a contributor to theAppleBlog, which is not affiliated with the computer company.

    "It's a very low-level attack," he said. "Some people won't even notice the effect of it."

    It is in the interest of software companies like Symantec, who spread the news, and McAfee, which has downplayed the presence of the Trojan, to raise concerns so they can promote their antivirus software packages, he said.

    "Yes, it is going to become a bigger problem and, yes, people have to become more aware, but I think that what McAfee and Symantec would like is for the panic to start and for people to start rushing to antivirus software," which isn't necessary yet, Etherington said.

    In a statement, Apple said it is working to prevent security problems.

    "Apple takes security very seriously and has a great track record of addressing potential vulnerabilities before they can affect users," the statement says.

    Only about 7.4 percent of computer users work on Macs, according to Gartner, a technology research firm.

    That user base is proportionally more affluent than PC users, Etherington said, which may make Mac a bigger target. But overall, Macs are still far less vulnerable to attack than PCs, he said.

    Haley said news of the Apple botnet is significant in part because it's something other authors of malicious code can build from.

    "I don't think it's a tipping point; I think it's an evolutionary step. We see virus authors often use what somebody else has done," he said. "There's a model. There's something out there to follow."


    #2
    BreakBeat should be along momentarily. JAT

    Comment


      #3
      Yep it's a trojan........


      It needs user permissions to install itself and is found on pirate software.........not a self propagating virus though.......big difference.





      Millions of Windows PCs taken over by hackers, including UK and US gov’t machines; Macs unaffected
      Wednesday, April 22, 2009 - 09:59 AM EDT
      "Almost two million PCs globally, including machines inside UK and US government departments, have been taken over by malicious hackers," Darren Waters reports for BBC News.

      "Several PCs inside six UK government bodies were compromised by the botnet," Waters reports.

      "It is the second time in a year that PCs inside government departments have been hacked to form part of a botnet," Waters reports.

      "Once a machine has been compromised, it can be instructed to download further software, which puts the machine at the mercy of malicious hackers," Waters reports. "The compromised PCs are capable of reading e-mail addresses, copying files, recording keystrokes, sending spam and capturing screen shots."

      "Once a single machine inside a corporate network has been made part of the botnet it puts other machines on the network at risk," Waters reports.

      "Almost half of the infected machines were in the US. Six percent of the botnet, about 114,000 machines from 52 different organisations, were from the UK, among them a single PC inside the BBC's network," Waters reports.

      "More than 70 different national government agencies from around the world were caught up in the malicious network," Waters reports.

      "All of the infected machines were Windows-based PCs and the vulnerability was targeting security holes in Internet Explorer and Firefox," Waters reports.

      Full article .

      Comment


        #4
        Do these douche bags have anything better to do?

        Comment


          #5
          fuuuuuuuuuck!!!! how am i gonna keep searching for **** now?

          Comment


            #6
            Originally posted by 1000 Left Fist View Post
            fuuuuuuuuuck!!!! how am i gonna keep searching for **** now?
            Get a linux os

            Comment


              #7
              Originally posted by 1000 Left Fist View Post
              fuuuuuuuuuck!!!! how am i gonna keep searching for **** now?
              I have a brazzers password beoch!

              Comment


                #8
                Originally posted by Breakbeat View Post
                Yep it's a trojan........


                It needs user permissions to install itself and is found on pirate software.........not a self propagating virus though.......big differe
                .
                this is just the beginning

                Comment


                  #9
                  This is a sign of the apocalypse.

                  Comment


                    #10
                    Originally posted by Concrete Punch View Post
                    this is just the beginning



                    The beginning of what?.............it's not like a windows spyware, ******* or virus where no permission is needed by the user.

                    Comment

                    Working...
                    X
                    TOP