Apple Flashback malware removal includes innovative approach to reducing risk for Macs

Apple is dealing with the harsh reality that Mac OS X has become a target for malware attacks.

By , PC World |  Security, Apple, Mac

Better late than never? Apple has released the third Java update in a week for Mac OS X, and this one contains the tool to remove the Flashback malware from infected systems. Beneath the belated fix to help users eradicate the threat, Apple has introduced a proactive approach to reducing security risk that other vendors should take note of.

This first couple Java updates already patched the underlying vulnerability. The latest version doesn't address any new vulnerabilities--it takes care of the destruction left in the wake of the vulnerabilities in the first place, and proactively reduces the exposure to risk for Mac users.

The latest Java update from Apple removes the known variants of the Flashback malware from infected Mac OS X systems. It also automatically disables Java if it has not been used during the previous 35 days. Once disabled, users have to manually re-enable Java in order for Java applets to run again. That means that malware attacks like Flashback would be unable to automatically execute and compromise Macs that don't regularly use Java.

In his Laws of Vulnerabilities blog, Qualys CTO Wolfgang Kandek appears to be impressed by Apple's innovative approach to minimizing risk. "This is exciting and to my knowledge nobody has done something like this before. It makes total sense to me: We have been telling users to disable or uninstall Java if they do not need it, but we know very well that only very security conscious users will do so."

It is a core tenet of computer and network security to disable or remove software and services that are not being used. Not doing so exposes the system to undue risk should a vulnerability be discovered and exploited against the unused tools and applications. Adding insult to injury, even when a flaw is discovered and announced, many users mistakenly believe the issue doesn't affect them because they're not actively using the tools. They'll ignore the patch and remain vulnerable.


Originally published on PC World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question
randomness