Have you had problems with the Flashback trojan on Macs?

SilverHawk

We only have a few people that bring their own Macs to my office, and as far as I know, it hasn't been a problem for any of them. Then again, they are all pretty much convinced that "Macs don't get viruses."  I'm not a Mac user personally, and we don't really support their use, but employees can use their personal Macs to access our WiFi. What are the risks posed by the Flashback trojan, and what are you doing to make sure that your network is safe?

Topic: Security
Answer this Question

Answers

2 total
jimlynch
Vote Up (19)

I haven't had any problems with it. I installed Apple's Java update, but I also disabled Java in Safari.

Here's how you can do it too:

http://www.itworld.com/security/266254/turn-java-safari

Here's some background on how you can diagnose and remove the trojan:

http://www.geek.com/articles/apple/check-if-your-mac-has-the-flashback-t...

dthomas
Vote Up (17)

 

I would certainly install the latest Java update immediately, if you haven't already.  It's easy to get complacent.  This must be excruciating for my, "Macs don't get viruses!" buddy.  They only make up something like 10-15% of the market, so it stands to reason that they would be less likely to be targeted by malware.  But "less likely" doesn't equal never.

 

Here is an article about checking to see if a Mac is infected.  There are a couple of links to free checkers if you need it.  http://9to5mac.com/2012/04/10/free-app-checks-for-the-flashback-trojan-infecting-600000-macs/#/vanilla/discussion/embed     

 

Ask a question

Join Now or Sign In to ask a question.
Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.
When online services lack privacy controls, you can roll your own using near military-grade encryption.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.

White Papers & Webcasts

Webcast On Demand

Cloud BI Overview: Jaspersoft for AWS

Sponsor: TIBCO Jaspersoft

Webcast On Demand

Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc.

Sponsor: TIBCO Jaspersoft

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+