Tel 678.697.4783
Fax 678.840.7870
Po Box 4432
Marietta, Ga 30061
info@jamboconsulting.com

 Subscribe in a reader



Lunarpages.com Web Hosting
Web hosting by ICDSoft

Archives

Previous Posts

Powered by Blogger

Sunday, November 23, 2008

Mac OS X targeted by Trojan and backdoor tool | Tech News on ZDNet

Not as serious as it may seem, but the hackers do seem to be gaining some ground on OS X.

The Trojan is found on porn websites posing as a codec needed to play video files, a technique used to trick the user into downloading and installing it.

OSX.Lamzev.A is a hacker tool designed primarily to allow attackers to install backdoors in a user's system, according to Intego. However, the company dismissed the tool as a serious threat because a potential hacker has to have physical access to a system to install the backdoor.


Mac OS X targeted by Trojan and backdoor tool | Tech News on ZDNet

Labels: , ,

Article Link posted by Edward at 11:42 PM
0 comments : Post a Comment : email post

<< Home

Tuesday, November 06, 2007

Tech: Leopard Trojan / Phishing fix

Last week the net was swamped with reports of a new Mac malware, the OSX.RSPlug.A Trojan Horse. Macworld has a detailed report on what it does and how to remove it.

From MacWorld:


  1. In the Finder, navigate to /Library -> Internet Plug-Ins, and delete the file named plugins.settings. Empty the trash. This deletes the tool that sets the rogue DNS Server information.

  2. In Terminal, type sudo crontab -r and provide your admin password when asked. This deletes the root cron job that checks the DNS Server settings. You can prove it worked by typing sudo crontab -l; you should see the message “crontab: no crontab for root.”

  3. Open your Network System Preferences panel, go to the DNS Server box, and copy the entries you can see to a Stickies note, TextEdit document, or memorize them. Now retype those same values in the box, then click Apply.

  4. Reboot your Mac.


Bottom line is to follow typical 'safe computing' guidelines...

As always, the best way to avoid these things is to not install software from untrusted sources—especially if it comes as an installer package and requests your administrator’s password! But if you do get infected, at least you’ll know how to confirm you have an issue, and remove the troublesome software.

Labels: , , ,

Article Link posted by Edward at 11:01 AM
0 comments : Post a Comment : email post

<< Home