Have you had problems with the Flashback trojan on Macs?

SilverHawk

We only have a few people that bring their own Macs to my office, and as far as I know, it hasn't been a problem for any of them. Then again, they are all pretty much convinced that "Macs don't get viruses."  I'm not a Mac user personally, and we don't really support their use, but employees can use their personal Macs to access our WiFi. What are the risks posed by the Flashback trojan, and what are you doing to make sure that your network is safe?

Topic: Security
Answer this Question

Answers

2 total
jimlynch
Vote Up (19)

I haven't had any problems with it. I installed Apple's Java update, but I also disabled Java in Safari.

Here's how you can do it too:

http://www.itworld.com/security/266254/turn-java-safari

Here's some background on how you can diagnose and remove the trojan:

http://www.geek.com/articles/apple/check-if-your-mac-has-the-flashback-t...

dthomas
Vote Up (16)

 

I would certainly install the latest Java update immediately, if you haven't already.  It's easy to get complacent.  This must be excruciating for my, "Macs don't get viruses!" buddy.  They only make up something like 10-15% of the market, so it stands to reason that they would be less likely to be targeted by malware.  But "less likely" doesn't equal never.

 

Here is an article about checking to see if a Mac is infected.  There are a couple of links to free checkers if you need it.  http://9to5mac.com/2012/04/10/free-app-checks-for-the-flashback-trojan-infecting-600000-macs/#/vanilla/discussion/embed     

 

Ask a question

Join Now or Sign In to ask a question.
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.
Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe when you travel.
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.
A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.
Questions abound over sites authenticating users via identities established through social networks, Yahoo Ponemon Institute survey shows.
Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.